Online Software Help Manual

Display Legacy Contents

Windows Security Policy Wizard

The Windows Security Wizard guides the user in setting up the applications security policy and in assigning an administrator user. Using this security policy the user management will be linked to the windows host computer or the overall IT-infrastructure.

Windows Security Policy Wizard Step 1:

Select the button 'By Windows Security Policy'. The security policy selection dialog looks like this:

Windows Security Policy Wizard Step 2:

When selecting "By Windows Security Policy" radio button, the software will first try to find all LDAP-servers available:

All available servers will be listed in a dropdown box and the user then needs to select an appropriate server or the local windows computer from the list:

Windows Security Policy Wizard Step 3:

All users that have access to the selected server/computer will be retrieved:

The user that will be the administrator of the application needs to be selected from the dropdown box:

Windows Security Policy Wizard Step 4:

To complete the administrator selection the software needs to be restarted:

Software restart and first login

After restarting, the software will have finished the security policy setup and the user will be welcomed by the login screen. The user who has been chosen as administrator beforehand needs to log in using his windows user account password:


 If there correct password has been entered, the software will prompt the administrator to continue with the Data Access Control setup:

The Data Access Control setup can be executed immediately or at a later point in time. In addition to the general security functions it will provide advanced user based data access control. If your working environment does not require data access control this setup can be skipped. Please review the chapter "Data Access Control" for further information.

Completing the security setup

After software security wizard has completed successfully, the basic security functions of the application are activated. The administrator will have access to the application with limited functionality. The security setup needs to be finalized by utilizing the following additional functions:

Optionally additional security functions may be configured:

Please review the corresponding chapters for further information.