Overview
The software platform offers many features and tools to manage user accounts for access control.
On this page:
User Configuration
The named Users with authorization to access the Solution are defined in the SecurityUsers table on Security → Users.
Pre-Defined Users
The following user names are configured by default:
Administrator: built-in user that controls the Security System. No password is configured by default. You should set a password for this user.
Guest: used by default to access and when you log off as another user. No password is configured by default.
User: used as a generic login user. No password is configured by default.
Guest access
If the User did not execute any LogOn or Identification procedure, it will be recognized as the pre-defined Guest User, which is equivalent to an anonymous access.
The Guest user is the default user for anonymous logins and does not have a password assigned. It cannot be deleted nor have a password added. When you log off as another user, the Guest user is activated. To restrict access to resources, you may modify the permissions for the Guest user.
Do not create other users with the same names or altering the row IDs of these built-in platform objects.
Administrator Unique Authorizations
The Administrator is the sole user capable of deleting, blocking users, and defining passwords for database interfaces.
It's only when logged as Administrator, it is possible to delete the history on TrackChanges and SolutionHistory tables.
Removing Users
You have three ways to disable users:
Blocking: use to block the user’s access. You may want to use this for users who are no longer in your company.
Flagging as deleted: use to block the user’s access and flag the user as deleted, without deleting the user. You may want to use this for users who are no longer in your company.
Deleting: removes the user completely from the system.
The method used varies according to the Security requirements on managing users for your application.
SecurityUsers Configuration Table
Property | Description |
---|---|
ID | Identifies uniquely the user within the system. |
VersionID | Identifies uniquely the version of the user's record. |
Name | Names the user. |
Permissions | Assigns the user to permission groups (e.g., Administrator, Maintenance, etc.) defined in Security/Permissions. Check out Permissions |
Password | Allows entry of a unique password for the user. Validates the password against configured requirements. Refer to Security Policies for configuring password requirements. |
PasswordHint | Provides a hint to help the user remember their password. |
Policy | Assigns the user to a security policy (e.g., Enhanced, Critical, Default) defined in Security/Policies. Check out Security Policies. |
Deleted | Indicates if the user account is marked for deletion. |
Alias | Offers an alternative name or identifier for the user. |
Company | Associates the user with a specific company or organization. |
UserGroup | Assigns the user to a specific group or department. |
Attributes | Describes additional attributes or characteristics of the user. |
Level | Specifies the user's level or rank within the organization. |
Category | Classifies the user into a category or type (e.g., technical, administrative). Refer to Categories to read more. |
LockState | Shows the current lock state of the user's account (e.g., locked, unlocked). |
DateCreated | Records the date when the user account was created. |
DateModified | Notes the date when the user account was last modified. |
ContactInfo | Lists contact information for the user (e.g., name, email, phone number). |
In this section: