Presentation on theme: "Overview of User Set-up & Security. Administrator Functions Before adding new Users, we first need to define some User Security Settings To do this navigate."— Presentation transcript:
Overview of User Set-up & Security
Administrator Functions Before adding new Users, we first need to define some User Security Settings To do this navigate to Templates-Change-Advanced
User Security in Template User Security is set up in the Advanced section of the Template User Security defines what, if anything, Users are restricted to view in reports User Security is defined by User Security (compulsory); Secondary User Security (optional); and Group Security (optional).
User Security in Template The User Security settings determine the default Analyze By/Restricted Analyze By fields in the report The Default Analyze By 1 field gives the default field of the Analyze By list when a user has been granted full access Default Analyze By 2-10 correspond to the default vlaues of the subsequent “Then By” lists Once a user has restricted access, the Analyze By and Then By fields are controlled by the Restricted Analyze By 1 and Restricted Analyze By 2-10 fields respectively
Administrator Functions Option to add User & Groups
User & Group Set-up Add a new User Or Create a new Group In IR Groups are only used to share User Favourites
Form to add a New User Options to: Restrict a User to a specific IP/ Subnet address Allow the user to share their Favourites Set-up default GoTo Page on Login. Options: Favourites, Report Wizard, Advanced Reporting Add User to a Group
Form to add a New User Specify which Mappings a User is allowed access to Access Levels: No Access, Full Access or Restricted Access Restricted access allows for up to 2 Dimensions specified in the Template to be used to restrict access for this user Access Levels are controlled via 4 drop down options: User Security restriction Secondary User Security restriction Group Security restriction Full Access
Secondary User SecurityGroup Security All Report Data User Security User Security in IR User Security is the only option enabled User access can be restricted by this field only
Secondary User SecurityGroup Security All Report Data User Security User Security in IR User Security & Secondary User Security are enabled User access can be restricted by either the User Security OR the Secondary User Security
Secondary User Security Group Security All Report Data User Security User Security in IR User Security & Group Security are enabled User access can be restricted by either the Group Security OR the User Security & Group Security together
Form to add a New Group When creating a New Group select which users are linked to the Group Note: Groups are only used in IR to share Favourites. They are not used to define Group/Bulk security profiles which individual users may then be linked to By using Interactive Reporting’s inbuilt user security settings, Group Favourites can be shared safely and securely
System Settings Options to set up the User Authentication Method Integrated System Database Uses default IR security & the system32.mdb to authenticate user login Active Directory IR Login Page Prompt Standard IR Login page but user credentials are checked against Windows Active Directory Active Directory IIS Directory Security User is automatically logged on to IR using Windows Active Directory credentials Underlying Datasource User login and password is the source database username and password
Mapping Tasks / Mapping Preferences Can over-write User/Group Security settings on a per-mapping basis. “Use Values from Template” = Yes the mapping uses security values specified in the Template. “Use Values from Template” = No we can select User, Secondary User and Group Security settings to be used for this Mapping.
Mapping Tasks / Security Mapping Security allows Access Levels defined in the Users & Groups to be over-written. Changes made on this Security page will update user access levels on the Users & Groups page
Security in Reports Summary The Security features in IR provide multiple benefits for Company security where access to sensitive information needs to be restricted User Security/Secondary User Security/Group Security restrict the information available to an individual user when generating reports e.g. Sales Rep reports can be limited to a view of only their own sales data With IR reports can be shared safely and securely with users without any additional work. A sales report for the company can be generated, saved as a favourite and shared with other users. If user security is restricted to Sales Rep for example, users accessing the favourite will only see their related sales information.