Online Software Help Manual

Display Legacy Contents

User Management

The user management is an essential part of the security system to manage and authorize all individuals with access to the application. After initially activating the security policy only the administrator user will have access to the software. Depending on the selected security policy the administrator needs to manually add new users or simply needs to activate existing user accounts from the windows system. The main features of the user management are:

  • User Information - shows details about the user

  • Account Activation - enables or disables the account

  • Permission Scheme - controls access to individual software functions by assigning permission schemes

  • Signature Role - controls access to data by assigning roles

  • Password Settings (only active when using the software security policy) - controls user password details

The user management dialog looks like this:

User Management Contents

The user management dialog consist of three main fields, the user list, user information and password settings:

User List

The user list shows all users that potentially have access to the application. The list contents slightly differ depending on the selected security policy:

  • Software Security Policy - the list shows all users that have been added by the user management system.

  • Windows Security Policy - the list shows the complete user list of the selected windows system/LDAP-server

By selecting a user in the list all of his account details can be managed. User accounts that are disabled are depicted with a special icon:

New User are added to list by clicking the New User button. Existing using can be deleted by clicking the Delete button. These buttons will not be available when using the Windows Security Policy.

User Information

The user information field manages detailed information about the user:

  • Full Name:
    Used to show/enter the full user name.

  • Description:
    Used to show/enter a description of the user account. This field will be disabled when using the Windows Security Policy since this information is provided by the operating system.

  • Department:
    Used to show/enter the department of the user.

  • Account Enabled:
    This checkbox controls the state of the selected user account. The user account is enabled if the checkbox is checked. A user account may be automatically disabled if a wrong password has been entered to many times in a row. Details about this feature can be found in the chapter "Password Policy". Disabled accounts are displayed with a special icon:

  • Permission Scheme:
    Assigns a permission scheme to the user account. Permission schemes are used to manage access to the applications menus and software functions. For example: Access to the security functions of the software can be denied to all user except the administrator using a permission scheme. The software offers a few predefined permission schemes. Permission schemes can be edited using the "Edit permission scheme" function and may alternatively assigned using the "Assign permission schemes" command. Please review the chapter "Permission Schemes" for a detailed description.

  • Signature Role:
    Assigns a signature role to the user account. Signature roles are similar to permission schemes but they manage access to data instead of software functions. By assigning a user to a signature role he may be granted or denied the rights to view, copy, modify and delete certain kinds of data. Signature roles are organized in Data Access hierarchy levels. Please review the chapter "Data Access Control" for detailed description.

Password Settings

The password settings manage the password options for a user. This field will be disabled when using the Windows Security Policy since the operating system is handling the password settings.

  • Password:
    Used to assign/change the user password.

  • Confirm Password:
    The password must be entered again to avoid accidental typing errors.

  • User must change password at next login:
    Activating this checkbox forces the user to change his password on the next login.

  • User cannot change password:
    Forces to user to keep the password that was assigned by the administrator.

Password Policy
Additional global password functions (minimum length, expiration interval etc.) may be determined using the command "Edit Password Policy" in the Security menu. Please review the chapter "Password Policy" for details.