Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

Manage Users function allows to authorize business users within CXO-Cockpit. A User can be member of one or more User Groups. In this case the user will inherit all permissions from these groups. Only users with 'Security Admin' permission are allowed to manage Users. 

View

Selecting 'Users' in the dropdown drop down from 'User' in the upper menu, the list of all available Users will be opened. From the list, you can see the Username, Full Name and Email, Email, License, Location and if the password is unchanged. Depending how the Authentication Adapter is configured additional columns can appear, i.e. Domain, Location, Change password.

Image RemovedImage Added

CONTENT

Table of Contents


 

At the right side of the screen, you may see the all the details of the User that you will select. Additionally, here, you may click on the Edit button which will open the Edit User Screen from where you can change the Main Settings, Permissions, POV Filters and Reports Settings of the User.

Image RemovedImage Added

Set Password

This option appears in the rigth right panel only if the system is configured to use a Proprietary Autentication Proprietary Authentication Adapter, i.e. passwords are managed directly in CXO-Cockpit

This option is for changing the password of the user which is selected at that moment. 
By clicking on Set Password, the Change Password for User Window will be opened. Here the new password should be inserted twice: In the Password and Confirm Password field.

Password must comply the requirements as set in the Application Settings. If the system is configured for automatic password expiration the password must be changed after the configured amount of time. This can be made by the user himself from the login panel or by the Administrator through the 'Set Password' function.

Filtering

You can also filter the list by any column in the list, e.g. typing the Username, Full Name, Email.

Image Removed

 Image Added

Options

The action that can be performed on a User by clicking on the Settings button in front of the Username column is  is Copy or Delete.

Image RemovedImage Added

Create new User

By clicking on the + New User button, you will open the New User Window. Here, the Username and Password are mandatory fields. The other settings are divided into four categories: Main, Permission, POV Filters and Reports. Image RemovedThe user can be added to groups and it is easy to see what minimum required license is needed to be added to a group. The Regular user of the screenshot below can be added to any group that contains either 'Light User' or 'Regular User'.

Image Added

Main

Main User Attributes are: Username, Full Name, Email and the User Groups he is member of. Only Username is mandatory and must be unique. The user does not need to be member of a User Group as all permissions can be set also on User level.
Depending how the system is configured additional fields will appear in the form.

If the System is set to use Windows Authentication

If the system is configured to use Windows Authentication, i.e. the Autentication Authentication Adapter is set to 'MSAD', creating and editing a user

  • the username must be the same as in Windows
  • the system will ask to specify the domain where the user credentials can be found. This field will be mandatory. 

When this option is selected the column 'Must Change Password' will not appear in the grid and 'Set Password' function will not appear in the right panel

If the System is set to use Essbase or LDAP Authentication

If the system is configured to use Essbase or LDAP Authentication, i.e. the Autentication Authentication Adapter is set to 'Essbase/LDAP', creating and editing a user

  • the username must be the same as Essbase/LDAP
  • no additional field will be required

When this option is selected the column 'Must Change Password' will not appear in the grid and 'Set Password' function will not appear in the right panel

If the System is set to use Proprietary Authentication

If the system is configured to use Proprietary Authentication, i.e. the Autentication Authentication Adapter is set to 'Proprietary', users and passwords will be managed directly in CXO-Cockpit and will be independent from other systems.
In this case creating and editing a user

  • Password and Confirm Password will appear
  • Must Change Password flag will appear. When it is selected the user will be required to change password at the first login.

When this option is selected requirements on the password strenght strength will be set in the Application Settigs Settings (e.g. password lenghtlength, special characters to be included). Through the Application Settings, the administrator can also set if the password must automatically expire after an amount of days.


The different license types are in the following order: 'Light User', 'Regular User', 'Report Builder' and 'Admin'

Permissions

Here, you can set the actions available to the user in the system. If the user is set as member of one or more User Group(s) the permissions inherited from them will appear by default as selected and disabled. These permissions can't be removed. You can set additional permissions which will be valid only for the current user. For more details view view the Permissions article.

Image RemovedImage Added

POV Filters

The POV Filters section allows you to filter the dimension members that are shown in the Point of View Bar. With this functionality users can be restricted to see only their own entity, product group, cost center, etc.

If the user is set as member of one or more User Group(s) the POV Filters inherited from them will appear by default as selected and disabled. These POV Filters can't be removed. You can set additional Filters which will be valid only for the current user. For more details view POV Security filters article. Select the Show Inherited POV limitations to se the POV filters Inherited by the Groups. 

 


Reports

Here, you can set which from the reports will be the home report for the user and select which from the reports will be available for the user to see. If you click on Show Inherited access to reports, you will be able to also see the access to reports that the user will inherit from the User Group added in the Main settings.