Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Security Users (Reference) manages user accounts, authentication, and access control throughout the solution. A SecurityUser defines:

  • Named user accounts with credentials
  • Permission group assignments
  • Security policy enforcement
  • Access control levels
  • User lifecycle management

The system includes pre-defined users and supports enterprise authentication methods.

In

The software platform offers many features and tools to manage user accounts for access control.

On

this page:

Table of Contents
maxLevel

3

2
minLevel2
indent10px
excludeSteps
stylenone



User Configuration

The named Users with authorization to access the Solution are defined in the SecurityUsers table on Security → UsersSecurity → Tutorial | Concept | How-to Guide |  Standards Compliance | Reference



Pre-Defined Users

The following user names

Three system users are configured by default:

  • Administrator: built-in user that controls the Security System. No password is configured by default. You should set a password for this user.

  • Guest: used by default to access and when you log off as another user. No password is configured by default.

  • User: used as a generic login user. No password is configured by default.

Guest access

If the User did not execute any LogOn or Identification procedure, it will be recognized as the pre-defined Guest User, which is equivalent to an anonymous access.

The Guest user is the default user for anonymous logins and does not have a password assigned. It cannot be deleted nor have a password added. When you log off as another user, the Guest user is activated. To restrict access to resources, you may modify the permissions for the Guest user.

Do not create other users with the same names or altering
UserPurposeDefault PasswordNotes
AdministratorSystem control and security managementNoneSet password immediately
GuestAnonymous access and default logoutNoneCannot add password
UserGeneric authenticated accessNoneTemplate for new users

<ac:structured-macro ac:name="warning"> ac:rich-text-body Do not delete or modify the row IDs of these built-in

platform objects.

Administrator Unique Authorizations

The Administrator is the sole user capable of deleting, blocking users, and defining passwords for database interfaces.

users. Do not create duplicate users with these names. </ac:rich-text-body> </ac:structured-macro>


Configuration Properties

PropertyDescriptionRequired
NameUnique username for loginYes
PermissionsPermission groups (comma-separated)Yes
PasswordEncrypted user passwordNo
PasswordHintPassword recovery hintNo
PolicySecurity policy assignmentNo
DeletedSoft delete flagNo
AliasAlternative identifierNo
CompanyOrganization associationNo
UserGroupDepartment/group assignmentNo
AttributesCustom user propertiesNo
LevelHierarchical access level (0-255)No
CategoryUser classificationNo
LockStateAccount lock statusAuto
ContactInfoEmail, phone, detailsNo

Guest Access

The Guest user provides anonymous access:

  • Active when no user logged in
  • Default after logout
  • No password capability
  • Cannot be deleted
  • Permissions define anonymous access level

Configure Guest permissions carefully to secure anonymous access.


Administrator Privileges

Exclusive Administrator capabilities:

  • Delete users permanently
  • Block/unblock accounts
  • Set database passwords
  • Delete audit trails
  • Modify security policies
  • Override permission inheritance

User Lifecycle Management

Creating Users

  1. Navigate to Security → Users
  2. Click first row to add
  3. Required fields:
    • Name: Unique identifier
    • Permissions: At least one group
  4. Optional security:
    • Password: Meet policy requirements
    • Policy: Assign security level

Disabling Users

Three methods for removing access:

MethodEffectUse CaseReversible
BlockPrevents loginTemporary suspensionYes
Flag DeletedBlocks + marks deletedAudit trail preservationYes
DeletePermanent removalComplete cleanupNo

Password Management

csharp

// Set password programmatically
@Security.SetPassword("username", "newPassword");

// Force password change
@Security.Users["username"].MustChangePassword = true;

// Check password expiration
if (@Security.Users["username"].PasswordExpired)
{
    // Prompt for new password
}

Runtime Authentication

Login Methods

Form-Based Login:

csharp

bool success = @Security.Login(username, password);
if (success)
{
    @Info.Trace("User logged in: " + @Client.UserName);
}

Windows Authentication:

csharp

@Security.UseWindowsAuthentication = true;
string windowsUser = @Client.WindowsUserName;

External Authentication:

csharp

// LDAP/Active Directory
@Security.AuthenticationMode = "LDAP";
@Security.LDAPServer = "domain.local";

Permission Integration

Users inherit permissions from assigned groups:

User: John
Permissions: Operator, Maintenance
Result: Combined permissions from both groups

See [Security Permissions] for group configuration.


Security Policies

Policies enforce password and session rules:

User: Mary
Policy: Enhanced
Result: Strong password, 90-day expiration, session timeout

See [Security Policies] for policy configuration.


User Properties Access

Runtime Properties

csharp

// Current user info
string currentUser = @Client.UserName;
string permissions = @Client.Permissions;
int level = @Client.Level;

// Check specific permission
bool canEdit = @Security.HasPermission("EditDisplays");

// User session
DateTime loginTime = @Client.LoginTime;
string ipAddress = @Client.IPAddress;

User Management

csharp

// Get user details
var user = @Security.Users["username"];
string company = user.Company;
string group = user.UserGroup;

// Modify user
user.ContactInfo = "john@example.com";
user.Level = 50;

Best Practices

  1. Set Administrator password - Immediately on deployment
  2. Use permission groups - Don't assign individual permissions
  3. Apply security policies - Enforce password standards
  4. Audit user changes - Track modifications
  5. Review Guest permissions - Minimize anonymous access
  6. Document user roles - Clear responsibility matrix
  7. Regular cleanup - Remove inactive users

Troubleshooting

Cannot login:

  • Verify username/password
  • Check account not blocked
  • Confirm permissions assigned
  • Review policy restrictions

Password issues:

  • Check policy requirements
  • Verify not expired
  • Confirm complexity rules
  • Test password hint

Permission denied:

  • Review group assignments
  • Check permission inheritance
  • Verify user level
  • Confirm not Guest user

Account locked:

  • Check failed login attempts
  • Review policy lockout rules
  • Administrator unlock required
  • Check LockState property

In this section...

Page Tree
root@parent
spaces93DRAF

It's only when logged as Administrator, it is possible to delete the history on TrackChanges and SolutionHistory tables. 

Removing Users

You have three ways to disable users:

  • Blocking: use to block the user’s access. You may want to use this for users who are no longer in your company.

  • Flagging as deleted: use to block the user’s access and flag the user as deleted, without deleting the user. You may want to use this for users who are no longer in your company.

  • Deleting: removes the user completely from the system.

The method used varies according to the Security requirements on managing users for your application.

SecurityUsers Configuration Table

Property

Description

ID

Identifies uniquely the user within the system.

VersionID

Identifies uniquely the version of the user's record.

Name

Names the user.

Permissions

Assigns the user to permission groups (e.g., Administrator, Maintenance, etc.) defined in Security/Permissions. Check out Permissions

Password

Allows entry of a unique password for the user. Validates the password against configured requirements. Refer to Security Policies (Reference) for configuring password requirements.

PasswordHint

Provides a hint to help the user remember their password.

Policy

Assigns the user to a security policy (e.g., Enhanced, Critical, Default) defined in Security/Policies. Check out Security Policies (Reference).

Deleted

Indicates if the user account is marked for deletion.

Alias

Offers an alternative name or identifier for the user.

Company

Associates the user with a specific company or organization.

UserGroup

Assigns the user to a specific group or department.

Attributes

Describes additional attributes or characteristics of the user.

Level

Specifies the user's level or rank within the organization.

Category

Classifies the user into a category or type (e.g., technical, administrative). Refer to Categories to read more.

LockState

Shows the current lock state of the user's account (e.g., locked, unlocked).

DateCreated

Records the date when the user account was created.

DateModified

Notes the date when the user account was last modified.

ContactInfo

Lists contact information for the user (e.g., name, email, phone number).

In this section:

Page Tree
rootV10:@parent
spacesV10