Section 12.2 Users, Groups and Roles Organizational Chart
Section 12.2
Organizational Chart of
Users, Groups and Roles
Related Articles
Section 12.3 Groups
Section 12.3 Groups A group of users are given access to work areas (projects/collections) that all need access to the same resources. Groups can be created based on individual users that all need access to certain resources, they can be created ...
Section 12.4 Roles
Section 12.4 Roles A security role is a collection of privileges in a workspace. Users can be assigned to a role and inherit the permissions defined in the role. Roles can be added to groups and will be restricted to performing the actions defined by ...
Section 12.5 Users
Section 12.5 Users A user is associated with an access license (UAL). They are not shared by Users; each User must have their own UAL. Once a User has their own UAL, it does not matter how many machines they log in from. Users are assigned a Role and ...
Section 12 Security Management
Security Management Security Management allows Administrators to set up users, groups, and roles which combined become a Security Policy. Policies are vital when it comes to keeping proper access rights to your most sensitive data. The ability to ...
Section 12.6 Security Policy
Section 12.6 Creating a Security Policy Administrators can create a security policy for a user or a role. Components of a Policy include the level (user/role), accessibility settings (group/user/role), and action settings. Each Security Policy must ...