Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Overview


On this page:

Table of Contents
maxLevel3


User Configuration

The Named Users with authorization to access the Solution are defined in the SecurityUsers table on Security → Users

Heading 2

Heading 3

Pre-Defined Users

The following user names are configured by default:

  • Administrator: built-in user that controls the Security System. No password is configured by default. You should set a password for this user.

  • Guest: used by default to access and when you log off as another user. No password is configured by default.

  • User: used as a generic login user. No password is configured by default.

Guess access

If the User did not execute any Log On or Identification procedure, it will be recognized as the pre-defined Guest User, which is equivalent to an anonymous access.

The Guest user is the default user for anonymous logins and does not have a password assigned. It cannot be deleted or have a password added. When you log off as another user, the Guest user must be available. To restrict access to resources, you may modify the permissions for the Guest user.

Avoid creating other users with the same names or altering the row IDs of these built-in platform objects. The Administrator is the sole user capable of deleting, blocking users, and defining passwords for database interfaces.

Default Properties

Security Users Properties

Field/Column

Description

Name

Enter a user name. The system allows you to know if the name is not valid.

Permissions

Select the permission group to be used by this user. See

Configuring Permissions

Permissions. Select multiple rows, right-click to edit the combined rows, when applying same settings to more than one user.

Password

Enter a password for the user. The system allows you to know if the password is not valid. You can configure password requirements. See

Configuring

Security Policies.

PasswordHint

Enter information that can help you remember the user’s password.

Policy

Select the policy settings to use for this user. See

Configuring

Security Policies.

Blocked

Select to block the user’s access. You may want to use this for users who are no longer in your company.

Deleted

Select to block the user’s access and flag the user as deleted, without deleting the user. You may want to use this for users who are no longer in your company.

Profile

Enter the user’s email address, phone number, and full name.


Removing Users

You have three ways to disable users:

  • Blocking: use to block the user’s access. You may want to use this for users who are no longer in your company.

  • Flagging as deleted: use to block the user’s access and flag the user as deleted, without deleting the user. You may want to use this for users who are no longer in your company.

  • Deleting: removes the user completely from the system.

The method used varies according to the Security requirements on managing users for your application.


In this section...

Page Tree
root@parent
spacesV10