1 / 16

Overview of User Set-up & Security

Overview of User Set-up & Security. Administrator Functions. Before adding new Users, we first need to define some User Security Settings To do this navigate to Templates-Change-Advanced. User Security in Template. User Security is set up in the Advanced section of the Template

belva
Download Presentation

Overview of User Set-up & Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Overview of User Set-up & Security

  2. Administrator Functions • Before adding new Users, we first need to • define some User Security Settings • To do this navigate to Templates-Change-Advanced

  3. User Security in Template • User Security is set up in the Advanced section of the Template • User Security defines what, if anything, Users are restricted to view in reports • User Security is defined by User Security (compulsory); Secondary User Security (optional); and Group Security (optional).

  4. User Security in Template • The User Security settings determine the default Analyze By/Restricted Analyze By fields in the report • The Default Analyze By1 field gives the default field of the Analyze By list when a user has been granted full access • Default Analyze By 2-10 correspond to the default vlaues of the subsequent “Then By” lists • Once a user has restricted access, the Analyze By and Then By fields are controlled by the Restricted Analyze By 1 and Restricted Analyze By 2-10 fields respectively

  5. Administrator Functions • Option to add User & Groups

  6. User & Group Set-up • Add a new User • Or Create a new Group • In IR Groups are only used to share User Favourites

  7. Form to add a New User • Options to: • Restrict a User to a specific IP/ Subnet address • Allow the user to share their Favourites • Set-up default GoTo Page on Login. Options: Favourites, Report Wizard, Advanced Reporting • Add User to a Group

  8. Form to add a New User • Specify which Mappings a User is allowed access to • Access Levels: No Access, Full Access or Restricted Access • Restricted access allows for up to 2 Dimensions specified in the Template to be used to restrict access for this user • Access Levels are controlled via 4 drop down options: • User Security restriction • Secondary User Security restriction • Group Security restriction • Full Access

  9. User Security in IR All Report Data • User Security is the only option enabled • User access can be restricted by this field only User Security Secondary User Security Group Security

  10. User Security in IR All Report Data • User Security & Secondary User Security are enabled • User access can be restricted by either the User Security OR the Secondary User Security User Security Secondary User Security Group Security

  11. User Security in IR All Report Data • User Security & Group Security are enabled • User access can be restricted by either the Group Security OR the User Security & Group Security together User Security Group Security Secondary User Security

  12. Form to add a New Group • When creating a New Group select which users are linked to the Group • Note: Groups are only used in IR to share Favourites. They are not used to define Group/Bulk security profiles which individual users may then be linked to • By using Interactive Reporting’s inbuilt user security settings, Group Favourites can be shared safely and securely

  13. System Settings • Options to set up the User Authentication Method • Integrated System Database • Uses default IR security & the system32.mdb to authenticate user login • Active Directory IR Login Page Prompt • Standard IR Login page but user credentials are checked against Windows Active Directory • Active Directory IIS Directory Security • User is automatically logged on to IR using Windows Active Directory credentials • Underlying Datasource • User login and password is the source database username and password

  14. Mapping Tasks / Mapping Preferences • Can over-write User/Group Security settings on a per-mapping basis. • “Use Values from Template” = Yes the mapping uses security values specified in the Template. • “Use Values from Template” = No we can select User, Secondary User and Group Security settings to be used for this Mapping.

  15. Mapping Tasks / Security • Mapping Security allows Access Levels defined in the Users & Groups to be over-written. • Changes made on this Security page will update user access levels on the Users & Groups page

  16. Security in Reports Summary • The Security features in IR provide multiple benefits for Company security where access to sensitive information needs to be restricted • User Security/Secondary User Security/Group Security restrict the information available to an individual user when generating reports e.g. Sales Rep reports can be limited to a view of only their own sales data • With IR reports can be shared safely and securely with users without any additional work. • A sales report for the company can be generated, saved as a favourite and shared with other users. • If user security is restricted to Sales Rep for example, users accessing the favourite will only see their related sales information.

More Related