Ръководство за PANTHEON™

 Categories
 Скласти тех карту
[Expand]User Manual for DataLab PANTHEON 5.5
[Collapse]Datalab PANTHEON 5.5
 [Expand]Orders
 [Collapse]Settings
  [Expand]Subjects
  [Expand]Items
  [Expand]Manufacturing
  [Expand]Personnel
   Calendar
  [Expand]Financials
  [Expand]Customs
  [Collapse]Program
   [Expand]Document Types
   [Expand]Reports
    Document Texts
    Delivery Methods
   [Expand]ARES
   [Collapse]Administration Panel
     Context Menu
    [Expand]Settings
     Menu
    [Collapse]Authorizations - General
     [Expand]Authorization Levels
      Authorizations and Assigning Them
      Right-mouse Click
     [Expand]Import Authorizations
      Authorizations for Authorizations
    [Expand]User Groups
    [Expand]Upgrade/About
    [Expand]Database
    [Expand]ZEUS
   [Expand]Logon
   [Expand]Dashboard Components
 [Expand]Manufacturing
 [Expand]Goods
 [Expand]Service
 [Expand]Financials
 [Expand]Personnel
 [Expand]ZEUS Business Intelligence System
 [Expand]Desktop
  Web Portals
  Extra
 [Expand]Datalab Software System Environment
 [Expand]Messages and Warnings
 [Expand]Additional Programs
 90632
[Expand]Pantheon RA (android POS) guide
[Expand]Довідник користувача Datalab PANTHEON Farming
[Expand]User Site

Load Time: 734,4043 ms
print   |
Label

Authorization Levels

Authorization Levels

Authorization Levels

010379.gif010381.gif010411.gif010382.gif010383.gif

The authorization tree is similar in structure to PANTHEON's main menu. It is used to restrict access to individual functions or function groups, either program-wide, for user groups or for individual users.

Authorizations are cascaded down in the authorization tree. For example, if you grant read access to the Settings node, all nodes below it (Subjects, Assets, etc.) will inherit it. Of course, the authorization level of those lower-level nodes can be changed.

000001.gif Available authorization levels:
  • none (lowest, no access)
  • read
  • write
  • delete (highest, full access)

44276.gif

The following parameters can be set for each node in the authorizations tree:

44277.gif From the Access dropdown menu, select the authorization level.
You can also select it using the context menu (right click).

The following authorization levels are available:

44278.gif None - no access; such features are hidden.
44279.gif Read - read-only; such features can be only viewed.
44280.gif Write - data can be viewed, entered and changed. 
44281.gif Delete - full access; data can be viewed, entered, changed and deleted.
44282.gif Back for X days - used for authorizations for single documents; this parameter specifies for how many days in the past the user can change or delete documents. Examples:
  • 0 = the current day,
  • 1 = the current day and the day before,
  • 30 = thirty days back,
  • -1 = unlimited; documents can always be changed or deleted.

See also Time Limit for Changing Documents.

 

000001.gif Authorizations without proper user identification are useless. If using authorizations, make sure users log on with their individual user names and passwords. It is also recommended to set a minimum password length to minimize unwanted intrusions.
000001.gif In some cases, (e.g. Items register authorizations ), only two authorization levels are available: None and Delete. Read and Write are not used, but if they are nonetheless selected, they count as Delete.

 




Rate this topic
Was this topic usefull?
Comments
Comment will also bo visible in forum!