 | Loading… |
|
|
Permissions

Permissions tab allows to manage user permissions.
The form can be accessed as sub-tab of Security tab, by clicking the individual user on the Users panel in Administration Panel.

 |
HINT
To make it easier to review your settings between users, you can open the form in a separate tab or window. Read more in chapter Settings (Comparing permissions).
|
The form is made up of certain elements, which we describe below.
In this section, you can filtering and searching by authorization tree or authorization's name.

|
If select one or more ( ), program display only selected permissions in Permissions tree structure below.
Users can be assigned the following permissions:
- None – there are no permissions. Such features are hidden.
- Read – user can only read data.
- Write - user can read, write and change data.
- Delete – user can read, write, change end delete data. User has full permissions.
|
Search |
The search engine searches the authorization tree, where the PANTHEON menu names or the authorization name are written.
Confirm selection with ENTER and all results are filtered and colored in yellow.

|

|
The location of currently settings: for which user (ACC_ANNE) and wich authorisation (APPL).
|
In this section, you can preview on authorizations tree certain permission for user.
Datalab Applications
|
Is authorizations tree with Datalan Applications names (menu names)
The name is preceded by a permission icon, which is set on the right side, in the permission management console.
Icons for permissions:
- None
- Read
- Write
- Delete
|
APPL
|
Authorization's name.
|
In this section, you can copy permissions from source principal or propagate securities for selected user.

(Source principal)
|
List of all principals (users) in database. From the drop-down list choose user, from which you want to copy authorization settings.
|

|
By clicking, authorization setting is copied from source principal to selected user.
 |
HINT
By clicking, a confirmation window is displayed to prevent the user from copying the rights unwantedly. The permissions are copied when click button OK.

|
|

|
By clicking, all changes with permisions are applied - are in use.
|

|
- Propagate security - All child entity will adopt permissions as set on a parent entity. If child entities have inherited permissions, those permissions will not be affected.
- Propagate Security and Override Acquired - All child entities permissions will be affected and adopt permission as set on a parent entity.
- Propagate security explicitly - All child entities permissions will be affected and adopt permission as set on a parent entity explicitly. Permissions on child entities that were previously inherited, will be explicitly set and no longer inherited.
 |
HINT
Right click on user permissons table offers the same propagate security functionality.
|
|

|
By clicking, selected propagate security from drop-down list is used.
|
In this section, you can checking and editing permissions for selected user.
 |
HINT
Right click on user permissons table offers propagate security functionality.
|
Name
|
User name for log in of user.
The username is preceded by a permission icon, which is set on the right side, in the permission tree console.
|
Title
|
Name od user.
|
Inherited from parent
|
Permissions are inherited from a parent entity.
|
Acquired from user group
|
If checked ( ), permissions are inherited from the user group when user is assigned (add) to the user group.
If not checked, permissions are set at the user level.
|
Basic permissions
|
- None – there are no permissions. Such features are hidden.
- Read – user can only read data.
- Write - user can read, write and change data.
- Delete – user can read, write, change end delete data. User has full permissions.
 |
HINT
Only one of basic permission can be selected.
|
|
Write period
|
Back for X days - used for authorizations for single documents; this parameter specifies for how many days in the past the user can change or delete documents.
Examples:
- 0 = the current day,
- 1 = the current day and the day before,
- 30 = thirty days back,
- -1 = unlimited; documents can always be changed or deleted.
 |
HINT
When write period is expired, the IRIS message is open.
|
|
Full
|
If checked ( ), user has full permissions (user can read, write, delete) for an indefinite period of time for selected authorization.
|
Modified date
|
Date and time of the change.
|
Modified By
|
Username of user, who is modified data.
|
 |
Warning
- Newly created user is without permissions by default.
- If the user is assigned to the user group, it inherits the permissions of the group.
- User can be a member of a group or not.
- If user is assigned to the group, it inherits permissions of group.
- Permissions that are explicitly defined at the user will take priority over permissions set on a group.
- LT edition does not support authorizations, that is, you can assign it on the level of the entire program.
|
 | Loading… |
 | Loading… |
|
|
|