PANTHEON™ navodila

 Kazalo
 Glavna stran - Dobrodošli v PANTHEON navodila
[Collapse]PANTHEON
 [Collapse]Vodiči za PANTHEON
  [Expand]Vodič po PANTHEON-u
  [Expand]Vodič po PANTHEON Farming
  [Expand]Vodič po PANTHEON Retail
  [Expand]Vodič po PANTHEON Vet
 [Collapse]Uporabniški priročniki za PANTHEON
  [Expand]Uporabniški priročnik za PANTHEON
  [Expand]Uporabniški priročnik za PANTHEON Retail
  [Expand]Uporabniški priročnik za PANTHEON Vet
[Collapse]PANTHEON Web
 [Collapse]Vodiči za PANTHEON Web
  [Expand]Vodič po PANTHEON Web Light
  [Expand]Vodič za PANTHEON Web Terminal
  [Expand]Vodič za PANTHEON Web Legal
  [Expand]Arhiv starih izdelkov
 [Collapse]Uporabniški priročniki za PANTHEON Web
  [Expand]Kako začeti
  [Expand]Uporabniški priročnik za PANTHEON Web Light
   Uporabniški priročnik za PANTHEON Web Terminal
  [Expand]Arhiv starih izdelkov
  [Expand]Uporabniški priročnik za PANTHEON Web Legal
[Collapse]PANTHEON Granule
 [Collapse]Vodiči za PANTHEON Granule
  [Expand]Granula Kadri
  [Expand]Granula Potni nalogi
  [Expand]Granula Dokumenti in Opravila
  [Expand]Granula Nadzorna plošča
  [Expand]Granula B2B Naročanje
  [Expand]Granula Servis na terenu
  [Expand]Inventar fiksnih sredstev
  [Expand]Granula Inventura skladišča
 [Collapse]Uporabniški priročniki za PANTHEON Granule
   Začetek
   Primer uporabe PANTHEON Granul v namišljenem podjetju
  [Expand]PANTHEON Granule in aktivacija
  [Expand]Granula Kadri
  [Expand]Granula Potni nalogi
  [Expand]Granula Dokumenti in opravila
  [Expand]Granula B2B naročanje
  [Expand]Granula Nadzorna plošča
  [Expand]Granula Servis na terenu
  [Expand]Granula Inventura osnovnih sredstev
  [Expand]Granula Inventura skladišča
   PANTHEON Granule - pogosta vprašanja in odgovori
   Arhiv
[Expand]Uporabniške strani

Load Time: 406,256 ms
"
  6613 | 1 | |
Label


Permissions

       

Permissions tab allows to manage user permissions.

The form can be accessed as sub-tab of Security tab, by clicking the individual user on the Users panel in Administration Panel.

HINT

To make it easier to review your settings between users, you can open the form in a separate tab or window. Read more in chapter Settings (Comparing permissions).

 

The form is made up of certain elements, which we describe below.  

Table of contents

  1. Filter on Permissions tab
  2. Permissions tree structure
  3. Permissions management console
  4. User permissions table

1. Filter on Permissions tab

In this section, you can filtering and searching by authorization tree or authorization's name.

If select one or more (), program display only selected permissions in Permissions tree structure below.

Users can be assigned the following permissions:

  • None – there are no permissions. Such features are hidden.
  • Read – user can only read data.
  • Write - user can read, write and change data.
  • Delete – user can read, write, change end delete data. User has full permissions.
HINT

Each type of permission has own ikon.

Search

The search engine searches the authorization tree, where the PANTHEON menu names or the authorization name are written.

HINT

Read chapter Permissions tree structure.

Confirm selection with ENTER and all results are filtered and colored in yellow. 

The location of currently settings: for which user (ACC_ANNE) and wich authorisation (APPL).

2. Permissions tree structure 

In this section, you can preview on authorizations tree certain permission for user.

Datalab Applications

Is authorizations tree with Datalan Applications names (menu names)

The name is preceded by a permission icon, which is set on the right side, in the permission management console.

Icons for permissions:

  •  - None 
  •  - Read 
  •  - Write 
  •  - Delete 

APPL

Authorization's name.

3. Permissions management console 

In this section, you can copy permissions from source principal or propagate securities for selected user.

(Source principal)

List of all principals (users) in database. From the drop-down list choose user, from which you want to copy authorization settings.

By clicking, authorization setting is copied from source principal to selected user.

HINT

By clicking, a confirmation window is displayed to prevent the user from copying the rights unwantedly. The permissions are copied when click button OK.

 

WARNING
  1. When copying user settings it is required that you select user ID. If you leave the field empty, the following error is returned. Read more Source user must be defined!
  2. Before trying to copy authorization permissions you need to confirm the operation. Read more Are you sure you want to copy authorization settings from user (xx)?

By clicking, all changes with permisions are applied - are in use.

  • Propagate security - All child entity will adopt permissions as set on a parent entity. If child entities have inherited permissions, those permissions will not be affected.
  • Propagate Security and Override Acquired -  All child entities permissions will be affected and adopt permission as set on a parent entity.
  • Propagate security explicitly - All child entities permissions will be affected and adopt permission as set on a parent entity explicitly. Permissions on child entities that were previously inherited, will be explicitly set and no longer inherited. 
HINT

Right click on user permissons table offers the same propagate security functionality.

By clicking, selected propagate security from drop-down list is used.

4. User permissions table

In this section, you can checking and editing permissions for selected user.

HINT

Right click on user permissons table offers propagate security functionality.

 

Name

User name for log in of user. 

The username is preceded by a permission icon, which is set on the right side, in the permission tree console.

Title

Name od user.

Inherited from parent

Permissions are inherited from a parent entity.

HINT

Read more for Propagate Security

Acquired from user group

If checked (), permissions are inherited from the user group when user is assigned (add) to the user group.

If not checked, permissions are set at the user level.

Basic permissions

  • None – there are no permissions. Such features are hidden.
  • Read – user can only read data.
  • Write - user can read, write and change data.
  • Delete – user can read, write, change end delete data. User has full permissions.
HINT

Only one of basic permission can be selected.

Write period

Back for X days - used for authorizations for single documents; this parameter specifies for how many days in the past the user can change or delete documents.

Examples:

  • 0 = the current day,
  • 1 = the current day and the day before,
  • 30 = thirty days back,
  • -1 = unlimited; documents can always be changed or deleted.
HINT

When write period is expired, the IRIS message is open. 

Full

If checked (), user has full permissions (user can read, write, delete) for an indefinite period of time for selected authorization.

Modified date

Date and time of the change. 

Modified By

Username of user, who is modified data.

 

Warning
  1. Newly created user is without permissions by default.
  2. If the user is assigned to the user group, it inherits the permissions of the group.
  3. User can be a member of a group or not. 
  4. If user is assigned to the group, it inherits permissions of group.
  5. Permissions that are explicitly defined at the user will take priority over permissions set on a group.
  6. LT edition does not support authorizations, that is, you can assign it on the level of the entire program.

 

  

     


Ali so bila ta navodila uporabna?
Vaše povratne informacije bodo prispevale k boljši pomoči.
Komentarji
Komentarji so izpostavljeni tudi na forumu.