160 likes | 282 Vues
This guide details the steps for configuring user security settings in Interactive Reporting (IR) systems. Before adding users, it's essential to define security settings, including User Security, Secondary User Security, and Group Security. Administrators can add new users or groups and assign access levels ranging from no access to full access. The guide also discusses authentication methods using Integrated System Database and Active Directory and emphasizes how to restrict sensitive information in reports effectively. Enhanced security features allow for secure sharing of reports while maintaining confidentiality.
E N D
Administrator Functions • Before adding new Users, we first need to • define some User Security Settings • To do this navigate to Templates-Change-Advanced
User Security in Template • User Security is set up in the Advanced section of the Template • User Security defines what, if anything, Users are restricted to view in reports • User Security is defined by User Security (compulsory); Secondary User Security (optional); and Group Security (optional).
User Security in Template • The User Security settings determine the default Analyze By/Restricted Analyze By fields in the report • The Default Analyze By1 field gives the default field of the Analyze By list when a user has been granted full access • Default Analyze By 2-10 correspond to the default vlaues of the subsequent “Then By” lists • Once a user has restricted access, the Analyze By and Then By fields are controlled by the Restricted Analyze By 1 and Restricted Analyze By 2-10 fields respectively
Administrator Functions • Option to add User & Groups
User & Group Set-up • Add a new User • Or Create a new Group • In IR Groups are only used to share User Favourites
Form to add a New User • Options to: • Restrict a User to a specific IP/ Subnet address • Allow the user to share their Favourites • Set-up default GoTo Page on Login. Options: Favourites, Report Wizard, Advanced Reporting • Add User to a Group
Form to add a New User • Specify which Mappings a User is allowed access to • Access Levels: No Access, Full Access or Restricted Access • Restricted access allows for up to 2 Dimensions specified in the Template to be used to restrict access for this user • Access Levels are controlled via 4 drop down options: • User Security restriction • Secondary User Security restriction • Group Security restriction • Full Access
User Security in IR All Report Data • User Security is the only option enabled • User access can be restricted by this field only User Security Secondary User Security Group Security
User Security in IR All Report Data • User Security & Secondary User Security are enabled • User access can be restricted by either the User Security OR the Secondary User Security User Security Secondary User Security Group Security
User Security in IR All Report Data • User Security & Group Security are enabled • User access can be restricted by either the Group Security OR the User Security & Group Security together User Security Group Security Secondary User Security
Form to add a New Group • When creating a New Group select which users are linked to the Group • Note: Groups are only used in IR to share Favourites. They are not used to define Group/Bulk security profiles which individual users may then be linked to • By using Interactive Reporting’s inbuilt user security settings, Group Favourites can be shared safely and securely
System Settings • Options to set up the User Authentication Method • Integrated System Database • Uses default IR security & the system32.mdb to authenticate user login • Active Directory IR Login Page Prompt • Standard IR Login page but user credentials are checked against Windows Active Directory • Active Directory IIS Directory Security • User is automatically logged on to IR using Windows Active Directory credentials • Underlying Datasource • User login and password is the source database username and password
Mapping Tasks / Mapping Preferences • Can over-write User/Group Security settings on a per-mapping basis. • “Use Values from Template” = Yes the mapping uses security values specified in the Template. • “Use Values from Template” = No we can select User, Secondary User and Group Security settings to be used for this Mapping.
Mapping Tasks / Security • Mapping Security allows Access Levels defined in the Users & Groups to be over-written. • Changes made on this Security page will update user access levels on the Users & Groups page
Security in Reports Summary • The Security features in IR provide multiple benefits for Company security where access to sensitive information needs to be restricted • User Security/Secondary User Security/Group Security restrict the information available to an individual user when generating reports e.g. Sales Rep reports can be limited to a view of only their own sales data • With IR reports can be shared safely and securely with users without any additional work. • A sales report for the company can be generated, saved as a favourite and shared with other users. • If user security is restricted to Sales Rep for example, users accessing the favourite will only see their related sales information.