EPM Performance Suite Profitability Administration & Security Guide

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "EPM Performance Suite Profitability Administration & Security Guide"

Transcription

1 BusinessObjects XI R EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R Windows

2 Patents Trademarks Copyright Third-party Contributors Business Objects owns the following U.S. patents, which may cover products that are offered and sold by Business Objects: 5,555,403, 6,247,008 B1, 6,578,027 B2, 6,490,593 and 6,289,352. Business Objects, the Business Objects logo, Crystal Reports, and Crystal Enterprise are trademarks or registered trademarks of Business Objects SA or its affiliated companies in the United States and other countries. All other names mentioned herein may be trademarks of their respective owners. Copyright 2007 Business Objects. All rights reserved. Business Objects products in this release may contain redistributions of software licensed from third-party contributors. Some of these individual components may also be available under alternative licenses. A partial listing of third-party contributors that have requested or permitted acknowledgments, as well as required notices, can be found at:

3 Contents Chapter 1 Chapter 2 Chapter 3 Chapter 4 Administration in EPM Introduction...4 Application Security User Security Features Users & Groups System Administrator System Defined User Groups User Group Security Licenses User Group Security Access Levels Creating a new Group Creating and Maintaining Users User & Group Maintenance Information and Management User Model Access Password Security Strong Passwords Password Expiry Configuring Login Failure Count System Login Options EPM Standard Security Single Sign On Web Security...20 Model Security Model Security Features Group/Dimension Security Security Descriptors Action Access Security Group Field Access Security Group Dimension Access Security Group Report Task Access Security Group Group / Descriptor Assignments Security Access Levels Security Access Interactions Books Security Books Action Access Home Pages/Default Books Book Security Assignment Security Export...30 Managing Models Model Administration Access to Model Administration Model Management functions New Model Open Model Copy Model Rename Model Delete Model Modify Model Properties Amend Model Description Change Model Server...36 BusinessObjects Administration & Security Guide 1

4 Contents Chapter 5 Chapter 6 Appendix A Enable/Disable Model Audit Model Partitioning...36 Language Capabilities Localization Issues Managing Data Aliases...37 EPM Monitor Monitoring Current Usage User Details Logging off a User License Details...37 Business Objects Information Resources...37 A1. Documentation and information services...37 A2. Documentation...37 A3. Customer support, consulting and training...37 A4. Useful addresses at a glance...37 Appendix B Security Descriptor Definitions...37 B1. Action Access Security Group Definitions and Security Levels...37 B2. Field Access Security Group Definitions...37 B3. Dimension Access Security Group...37 B4. Report Task Access Security Group...37 Index BusinessObjects Administration & Security Guide

5 Administration in EPM

6 Administration in EPM 1 Introduction 1.1 Introduction EPM is a powerful financial modeling tool that uses the latest technology to make budgeting, forecasting and forward planning both responsive and simple to control. It is one of the main components in the Business Objects Enterprise Performance Management suite that has been assembled to provide for all aspects of strategic planning. EPM has been designed to operate in a web environment with an international user community. These users require a diverse range of security privileges to the various financial models used by any company. Administrators are responsible for creating and maintaining this user security, for managing the financial models and for supporting the international language requirements within an organization. Security in EPM is broadly managed on two levels, one being application security for individual users which is applied across all models in the database, and the other being model security, in which case settings are specific for each model. Other administrative functions within EPM include the management and maintenance of models, and setting options for viewing dimension items in alternate languages or codes through the use of aliases. Additionally, an administration utility is available on the EPM server for monitoring and controlling users connected to the EPM suite. The functionality available to an Administrator is described in the following topics: Application Security Model Security Managing Models Language Capabilities EPM Monitor Users that are not Administrators can perform some of these functions, but only if an Administrator has given them the security privilege to do so (see 3 Model Security). 4 BusinessObjects Administration & Security Guide

7 Application Security

8 Application Security 2 User Security Features 2.1 User Security Features Security in EPM is assigned to users through User Groups. User Groups can be thought of as holding a collection of users with identical functions and security access levels. This section describes how to set up users within appropriate User Groups, together with their password and login requirements. The user security settings apply to all models across the system. Tip: When setting up security in EPM it is useful to start from a User category point of view and create relevant User Groups rather than trying to tailor Groups around a specific user s requirements. This will provide greater flexibility in the long term. The following sections describe the procedures for setting up User Groups and Users, together with user access to applications and models via security settings, passwords and login options. Users & Groups User Model Access Password Security System Login Options 2.2 Users & Groups User access to each model is controlled by User Group model specific security settings. Therefore when setting up security in EPM, it is useful to start by defining the access requirements at the User Group level. There are five system defined user groups, and any number of additional groups may be created as required (see section 2.2.5). EPM is supplied with a default system administrator who is a member of every system defined group and has access to all models and settings. Users and Groups are discussed in the areas detailed below. System Administrator System Defined User Groups User Group Security Licenses User Group Security Access Levels Creating a new Group Creating and Maintaining Users User & Group Maintenance Information and Management System Administrator EPM is supplied with a default Administrator user when first installed. This Administrator user is a super user that always has full access rights to all system facilities and models. For greater security, this system-defined user should be renamed and the default password changed. It is recommended that you create administrator users specific to your organization rather than use this default Administrator user which is intended for the initial setup. This default user does not use any of the license allocations that will have been purchased for EPM and can be unassigned from any User Group which is not needed (e.g. End Users). 6 BusinessObjects Administration & Security Guide

9 Application Security Users & Groups System Defined User Groups Five system-defined User Groups exist in EPM. These are system generated on installation and are used to define basic user types and thereby automatically allow or restrict access to different forms of the EPM application. These system-defined User Groups are distinguishable from user defined groups by their uppercase lettering with accompanying icons. Tip: It is useful to think of these system-defined User Groups in terms of attaching basic user functionality and to create additional User Groups (see 2.2.5) to allocate more specific User security access levels (see 2.2.4). Every new user automatically belongs to the Everyone group, and will need to be made a member of another group to gain access to an EPM application. Each of the system-defined groups is discussed below: Everyone Administrators Modelbuilders Bookbuilders Endusers Everyone All users must belong to this group. The Everyone group defines a basic level of access to different functions, values and general dimension attributes in EPM. Access levels are cumulative for any other groups to which a user belongs, so the Everyone access levels should be left at a basic level while additional groups should be used for defining higher access levels Administrators An administrator can: Create and manage models Create and manage users and groups Create security descriptors and allocate security options Create and unlock Books Create Item Properties Create Aliases View Model Security and Security Alerts Perform all other actions and edit all items within EPM dependent on which license type is inherited through additional group membership. This restricts access according to principles outlined in each user group below for each user. Membership of the Modelbuilders, Bookbuilders or Enduser group gives access to the corresponding Model Building application, Book Building application or Enduser interface respectively. See the corresponding section for more information on each of these role types. Modelbuilders Bookbuilders Endusers By default Administrators have full access to all Dimensions and Security Descriptors. This level of access cannot be altered. BusinessObjects Administration & Security Guide 7

10 Application Security 2 Users & Groups Modelbuilders Model Builders primarily have access to the Model Builder application. A member of Modelbuilders inherits a Model builder license and Enduser functionality. This allows potential access to almost all components of EPM. A Model Builder, given the correct access can potentially: Manage Models Import and Export data Edit Dimensions items Perform Dimension assignments Build and save Grid layouts Create and edit Books Perform Driver Analysis Access Books over the web Note: Model Builders cannot access the Book Builder application as their license is not suitable for this form of EPM (see for more information) Bookbuilders Membership of the Book Builder group gives users access to the Book Builder application. A member of Bookbuilders inherits a Book Builder license and an Enduser license. This allows potential access to a more targeted set of functions which are useful to users who build books. A Book Builder can potentially: Build and export layouts in the View Builder Create and edit Books Access Books over the web Note: Book Builders cannot access the Model Builder application as their license is not suitable for this form of EPM (see for more information) Endusers Membership of the Enduser group gives users access to published Books over the web or through the Book Viewer application. The books which are available to Endusers are specified by either an Administrator or Modelbuilder. Access can also be determined by membership of additional user defined User Groups. This ensures that Endusers can only see these Books, and the grids they contain which are relevant to them. An Enduser can: View information within Books in the form of grids, reports and charts. View and edit data Select which Data Alias to use for viewing information Select which currency monetary values are displayed in View Model alerts Note: Endusers have no access rights to the EPM Win32 client (Book Builder or Model Builder applications). See for more information on End User licenses User Group Security Licenses EPM is divided into three main applications comprising of a Model Builder application, Book Builder application and End User interface. Membership to one of these User Groups is compulsory in order to 8 BusinessObjects Administration & Security Guide

11 Application Security Users & Groups 2 access the relevant part of EPM. Access to these applications is determined using the system predefined User Groups. System predefined User Groups have an additional purpose other than to physically restrict access to specific Security Descriptors. These User Groups are also linked to license types which are utilized in defining user roles at the base level. Such user roles are defined to a certain extent in terms of which particular form of EPM application you may access. Licenses are inherited according to User Group membership with some User Groups inheriting more than one type of user license. These are detailed in each section below. Model Builder Access Book Builder Access End User Access Administrator Access Model Builder Access A member of Model Builders automatically inherits a license to access the Model Builder application including Books in addition to the web interface. See for more information on Model Builders. (A Model Builder may be involved in creating Books as well as model structures and may therefore wish to preview Books over the web). Note: A Model Builder cannot access the Book Builder application but is given access to all Book building functionality through the Model Builder application Book Builder Access A member of Book Builders automatically inherits a license to access the Book Builder application in addition to a license to access the web interface. See for more information on Book Builders. (A Book Builder may want to preview newly created Books over the web interface to ensure that they appear to an acceptable standard). Note: A Book Builder cannot access the Model Builder application but instead is given access to the Book Builder application which contains all Book Building functions including the View Builder in addition to general EPM functions End User Access A member of End Users only inherits a license permitting them to access the EPM web interface or Book Viewer application. See for more information on End Users. Note: An End User cannot access either the Model Builder or Book Builder EPM application due to their license restrictions. An End User can only login and access EPM through a web enabled Book Administrator Access A member of Administrators inherits an Administrator User license permitting them to perform certain administration functions such as basic user security, model security and partitioning. When this access is combined with a Modelbuilder license then the user will have Full Access to all aspects of the Modelbuilder application and Web use. This will allow a user to assign specific security to dimension items and user groups within all models they have access to depending on Model Security. See for more information on Administrator users. BusinessObjects Administration & Security Guide 9

12 Application Security 2 Users & Groups User Group Security Access Levels Security access for each user group is controlled by Security Descriptors and these are described in more detail in section 3.3 as part of Model Security. However, before defining your users and groups, it is important to understand how access levels for groups can be applied to suit your requirements. Individual users inherit the security levels assigned to each of the groups to which they belong for a specific model. Where a user belongs to more than one User Group they inherit a combination of the widest security permitted within all of the User Groups. For example, if the Administrators group has No Access to Maintaining Users and a User Maintenance group has Full Access, a user who is a member of both groups will attain Full Access to Maintaining users. For licensing purposes, some tasks require users to be a member of one of either of the Administrators, ModelBuilders or BookBuilders groups, in order to perform the operation. However, every user does not need to be permitted the access levels that are assigned to these predefined groups by default, if this is not required. For example, the default access level to Create Model Security is Full Access for Model Builders. To allow users to open the Model Builder application but prevent them from creating new models, change Create Model Security access to No Access for Model Builders. Now you can have users that belong solely the ModelBuilders group, who can open the Model Builder application without being able to create new models. Next, create another new User Group and assign it Full Access to Create Model Security. Thus, you can have other users belonging to both the ModelBuilders group and the newly created group, who can open the Model Builder application and also create new models Creating a new Group Groups are used to assign security access permissions. They allow you to define types of users with common access permissions to data and actions in EPM thus saving time when adding users with common requirements. Any number of groups can be defined. To create a new Group, select Tools Security Users and Groups. Once in the User and Group Maintenance screen, hover the cursor in the Groups area and right click to bring up the Context Menu. Select Add New Group from the menu. A default group name is inserted in an editable box, into which you should enter the name required for the new group. There is no minimum limit on the number of characters in a Group name. A group name may contain spaces, mixed case letters, alphanumeric and non-alphanumeric characters. Once you have entered a group name it will appear in the Groups list. You may then want to create new Users (see for details) and assign them to existing User Groups (see for details) Creating and Maintaining Users The User and Group Maintenance screen is accessed by selecting Tools Security Users and Groups. Using this screen, administrators can create new users and carry out basic security 10 BusinessObjects Administration & Security Guide

13 Application Security Users & Groups 2 administration tasks for users such as assigning them to groups, enabling or disabling user accounts and resetting passwords. User Properties are maintained which hold individual user details and options for password protection. The Default Model Group option provides additional security as it allows a user group to be associated with an individual model builder that will subsequently control access for all users to models created by that individual. Creating a New User Assign User Groups User s Default Model Group Password Reset Password Properties Account Enable / Disable Tip: Password protection can be further configured to ensure the use of strong passwords and to cause passwords to expire at set intervals, by applying settings in System Properties (see section 2.4 for further information) Creating a New User Only members of the administrator group can access the security screens and create new users. To create a new User, select Tools Security Users and Groups. Once in the User and Group Maintenance screen, hover the cursor in the Users area and right click to bring up the context menu. Select Add from the menu. A default user name is inserted in an editable box. Enter the required User name in this field. User names can contain spaces, mixed case letters, alphanumeric and non-alphanumeric characters. A user name must be at least 1 character and is not case sensitive. Once a user is created the username will appear in the Users list. When a user is highlighted their user group assignments are displayed in the screen. By default a new user belongs to the group Everyone. Once a new user has been created a warning is displayed indicating that a random password is generated for that user. In order that the new user can enter EPM their password must be reset from the random system password. Administrators can reset user passwords at any point (see for further information). Select Reset Password(s) from the right-click context menu in the Users window. An edit box will pop up prompting you to enter a new password and confirm this password. Select OK to set the new password. BusinessObjects Administration & Security Guide 11

14 Application Security 2 Users & Groups Tip: Several user passwords can be reset simultaneously if the reset passwords are identical. To do this select the Users to be reset and right-click to bring up the Context Menu then reset the user passwords in the normal fashion. If you have just created a new user they now need to be assigned to the desired User Groups (see ), and the user s Default Model Group may also be set as required (see ). For details on creating a new User Group see Assign User Groups Users must be assigned to Groups to inherit security settings and allow access to EPM. A user can be assigned to more than one Group in which case they will inherit the widest level of security access assigned to each of the security descriptors (i.e. least restricted). To assign a user to a group, select Tools Security Users and Groups. In the User and Group Maintenance screen, users are assigned to groups by selecting the required users(s) and selecting the check box adjacent to the relevant group. Similarly User Groups are unassigned by clicking on a checked box so that it is cleared User s Default Model Group Default Model Group allows a user group to be associated with an individual model builder. This is located by selecting Default Model Group from the right click context menu on the Users window of the User and Group Maintenance screen (see 2.2.7). The default setting for Default Model Group is Modelbuilders, which would give all members of the Modelbuilders group access to all new models. However, an individual user may be assigned to an alternative Default Model Group if required, and new models subsequently created by that user may only be accessed by users that are members of this group. This would be useful, for example, if you wished to create a model that should only be accessed by members of a User Group named European Model Builders. For the user that is to create the model, you would set the Default Model Group to European Model Builders. Once the model has been created by this user, it can then only be accessed by users who are members of the European Model Builders group. 12 BusinessObjects Administration & Security Guide

15 Application Security Users & Groups 2 Access to models is therefore controlled by membership of the Default Model Group, rather than on the basis of being a Model Builder. This allows more than one Model Builder to work within a system without having access to all the models present. (Administrators can see all models by default.) The model security access will remain associated with a model, regardless of whether it is copied, and this may only be amended by an administrator. Note that the act of allocating a default model group to a user does not automatically make this user a member of the group and they will need to be assigned to it manually (see section ). The group access for a model can be seen on the Model Administration Security tab (see 2.3) and this screen can be used to change the access if required Password Reset An administrator can reset user passwords at any point. Reset Password is located on the right click context menu on the Users window of the User and Group Maintenance screen (see 2.2.7). Multiple users can be reset at the same time, providing the password is to be the same across all users. Note: The default Administrator password cannot be reset using this screen. This user password can only be reset by the Administrator using the change password function in Tools Change Password. When a user s password needs to be reset, this state is denoted by a symbol next to the user name. The most likely circumstances that would require a user s password to be reset are: When users are first created (as a random password is set for new users) When users are imported into a database with a model, as user passwords cannot be exported from the original model. Alternatively a user may forget their password and need it to be reset without having been locked out of EPM. An administrator can in this case reset a user password using the procedure outlined above. Passwords can contain spaces, mixed case letters, alphanumeric and non-alphanumeric characters and are case sensitive. The default minimum password length is 5 characters. Password properties such as minimum password length and keyboard combinations (strong passwords) are defined on the System Properties Security tab (see section 2.4). After resetting the user s password, the administrator can set the User Properties to force the user to change their password when they next login (see section ) Password Properties The options on the User Properties General tab allow the administrator to set individual user password options. This tab is located by selecting Properties from the right click context menu on the Users window of the User and Group Maintenance screen (see 2.2.7). The Security Identifier (SID) may be stored against a user in the EPO system as an alternative means of User access, instead of the Username and Password. The use of SIDs increases the security of SSO integration, as a SID is not easily identifiable with a specific user. When a SID is used to log in, the Windows Client user interface and Web user interface will display the Username, rather than the SID. Password expiry can improve security by forcing users to change their password at set intervals. By default when new users are created the Password never expires property is switched on. Expiry Interval and Expiry Warning interval are configured in the System Properties window (see section for further information). BusinessObjects Administration & Security Guide 13

16 Application Security 2 Users & Groups The user properties window enables a number of password settings to be configured. User must change password at next login forces the user to reset their password when first logging on to the system. It is required if the user is to be forced to change their password once it has been either set at creation time or reset at any other time. User cannot change password should only be set if the Administrator intends to manage all user password changes or in conjunction with the Password never expires option. Password never expires is the default setting when a new user is created. This should be left enabled if the password expiry security is not required. Account is disabled provides the same functionality as the disable account function on the User context menu (see ) Account Enable / Disable To enable an account simply select the user in the User panel of the User and Groups Maintenance screen (see 2.2.7). A disabled account is denoted by a red cross next to the user name. Right click to bring up the context menu. Select Enable Account(s) and the account will no longer appear to be locked out. This function is useful when a user has disabled their account through too many unsuccessful login attempts. The number of unsuccessful logins allowed is held in System Properties (see 2.4.3). This value is normally set to 3 and a user account is automatically disabled after the fourth unsuccessful login attempt. Once this occurs the user must contact an Administrator to enable their account again in the Users and Groups screen. Similarly a user s account will become disabled if the user fails to change their password before the number of days set in the Password Expiry Interval (see 2.4.2). Alternatively, a user account may be set to disabled if you want to deny them access (perhaps they no longer need to use the system). To do this, select the user name and bring up the context menu as above. Then select Disable Account(s) and the selected account will be disabled and appear with a red cross next to the user name. The account Enable / Disable functionality is also found on the Properties screen, which is selected via the Properties option on the Users context menu. 14 BusinessObjects Administration & Security Guide

17 Application Security Users & Groups User & Group Maintenance Information and Management Users and Groups are created and maintained via the User and Group Maintenance screen. This is accessed by selecting Tools Security Users and Groups. By default the left-hand area contains the user names, the middle area contains User Groups and the right-hand area displays user information. The Users and Groups sections can be swapped using the context menu to allow an alternative focus displaying members according to Group membership. Information about a user is displayed when a user is selected in the Users area. There are two main areas of additional features on the User & Group Maintenance screen. These are the information panel down the right-hand side and additional features on the Context Menu. User & Group Maintenance Information Panel User Context Menu Group Context Menu Users & Groups Sorting User & Group Maintenance Information Panel The Security screen has an information area to the right of Users and Groups. This area displays information about a selected User. A user must be selected for any information to appear in this screen. Standard user information available in this screen is the user name, when the user was created, who the user was created by, address (for use in additional EPM applications such as Work Manager) and user group membership. BusinessObjects Administration & Security Guide 15

18 Application Security 2 Users & Groups If multiple users are selected in the user screen their user information is displayed in order in the user information area. This panel can be minimized by selecting the area between the two arrows in the cross bar dividing the areas. Similarly select the same area at the right hand side of the window to display the User information panel when it is minimized User Context Menu The User Context Menu contains the main functions required to manage Users. Add New User inserts a new User with an initial default name (see section for more information). Delete User(s) allows you to delete one or more selected Users in the panel. Reset Password(s) allows you to reset one or more selected User passwords (see for further details). Rename allows you to rename a selected user. Enable Account(s) allows you to enable a user account which has been locked out after too many unsuccessful login attempts (an account is locked on the fourth unsuccessful login attempt see for further details). Disable Account(s) allows you to disable a user account which will prevent that user being able to login to EPM (see for further details). Properties - the options on the General tab allow the administrator to set individual user password options and enter Full Name, Description and data (see section for details on security options). The Member Of tab shows Group Membership for that user. Default Model Group allows you to specify a user group to which all new models created by that user will be assigned (see for further details). Swap User / Group Focus swaps the position of Users and Groups on the screen for personal preference. 16 BusinessObjects Administration & Security Guide

19 Application Security User Model Access Group Context Menu Add New Group allows you to add additional groups which initially have a default group name to be to be edited (see for more information). Delete Group(s) allows you to delete one or more selected groups. Rename allows you to edit an existing group name. Filter on Membership allows you to filter the groups viewed. If this is checked only the groups to which a selected user is assigned will be displayed in the Groups panel. Swap User / Group Focus swaps the position of Users and Groups on the screen for personal preference Users & Groups Sorting User names and Group names can be sorted in alphabetical order in their respective panels by selecting their column headers. The order in which they are sorted is denoted by the arrow in the column header. Note: The Groups panel is sorted slightly differently to the Users panel as the predefined User Groups are grouped together followed by user defined Groups. 2.3 User Model Access The Security tab on the Model Administration screen is only available to administrators (see 4.2). Model Security restricts access to models according to the User Group that a model is assigned to. To be able to view a model in the Select Models screens in the Windows client or the Web, a user must be a member of a User Group assigned to that model. Without being assigned to an appropriate group, the user is effectively denied access to the model. Security access is assigned to each Model created within EPM according to User Group membership. By default a model is created with Administrators and Modelbuilders access only. This will not be the case if the user that created a model has been assigned an alternative Default Model Group (see section ) BusinessObjects Administration & Security Guide 17

20 Application Security 2 User Model Access In order for members of any other groups to access the model an Administrator must assign each Group security access within the Model Security tab in Model Administration. A user who is a member of several User Groups will have access to see each model that Group is assigned to. Further security restrictions can then be assigned within each model as outlined in section 3.4. All columns within the Model Security screen are sort-able and the Group / Model focus can be switched, in a similar manner to the Users and Groups screen, to allow security assignments to be viewed in a variety of manners. Sorting is denoted by an arrow in the column header. It is also possible to view Models according to the Users assigned to them using the View Models by User button within the Model Security screen. Selecting this will allow an Administrator to select a User name and to see which models that user has access to. 18 BusinessObjects Administration & Security Guide

21 Application Security Password Security Password Security The System Properties window is accessed via Tools Security System Properties. The Security tab provides system level options for password control that may be set by an administrator: The default minimum password length may be specified as required. Other options for password properties are: Strong Passwords Password Expiry Configuring Login Failure Count Strong Passwords Strong password protection ensures that users are forced to use a combination of letters and numbers or keyboard symbols when creating a login password. This is configured in the System Properties window accessed from the Tools Security System Properties window Password Expiry Password expiry can improve security by forcing users to change their password at set intervals. The Password Expiry settings are held on the System Properties window accessed from the Tools Security System Properties window. The Password Expiry Interval is set to 90 days by default whilst the minimum value that can be set is 30 days. The Password Expiry Warning is the number of days before a password is due to expire that will cause the user will be prompted to change their password. With the correct privileges a user can reset their password at any time and the expiry period will be reset. If the user fails to change their password before the expiry date the account will become disabled and will need to be reset by an administrator (see section ) Configuring Login Failure Count It is possible to configure the number of login failures before a user account is locked. This is set on the System Properties window accessed from the Tools Security System Properties window. The minimum value is 3 attempts, which is also the default setting. Once a user account is locked, only an administrator can reset it (see section ). BusinessObjects Administration & Security Guide 19

22 Application Security 2 System Login Options 2.5 System Login Options EPM can be configured to use either EPM standard security or can be integrated with Windows NT LAN Manager (NTLM), Windows Active Directory or LDAP compliant systems to allow Single Sign on (SSO). In addition it is possible to integrate logins over the web with Web Security directory services. EPM Standard Security Single Sign On Web Security EPM Standard Security This is the default. Only those users created by the EPM administrator and stored in the EPM database can log into EPM suite applications, dependent on their assigned roles Single Sign On A user login that matches the user s Windows login must have been created in EPM. If the windows and EPM logins match and the roles assigned to that user permit access then EPM applications will open without requiring the user to enter a login and password. User logins created in EPM do not require a password as the user has already been authenticated. However configuring passwords will permit a user to bypass SSO and access applications using EPM standard security. This maybe useful, in the first instance, in order to logon as administrator and create EPM logins that match a user s Windows login or where a user wishes to gain access using a different login or when the machine is not networked. Bypassing SSO is done by holding down the Shift key whilst clicking the Login icon, which will cause the default Login screen to appear. It is possible to install EPM with the following login options. Windows NT Security - A user s access is determined by authentication against a windows domain via NTLM. Microsoft Active Directory Security - EPM access is determined by user authentication against the Active Directory service for the domain. LDAP Security - EPM access is determined by user authentication against an LDAP compliant directory service. Tip: If logging onto the Web through SSO fails for any reason, then provided that Enable Secondary Logon has been set during EPO Configure, the usual login form will be displayed. If the configuration option has not been set, then an error message will be displayed. To use the override procedure, cancel the login dialog or any error message then, while holding down the Shift key, click on the Refresh icon or the GO button. You will then be able to enter the required username and password Web Security EPM login can be integrated with Web security to allow SSO access to books viewed over the web. The following is guidance for the System Administrator in order to allow EPM security to be integrated with Web security. The following steps assume you have set up a Form based Authentication scheme which is used in the Policy Domain protecting the IIS EPM web resources: 1. In the COREid Access Manager locate the Policy Domain that was created to protect the Resource for the IIS EPM Directory. 2. Select the Policy and select the Default Rules Tab. 3. In the Authentication Rule > Actions Tab, Select Add. 20 BusinessObjects Administration & Security Guide

23 Application Security System Login Options 2 4. In the Redirect To box for the Authentication Success enter the hostname and path to book.asp, found in the EPM IIS files folder. e.g. /epo/book.asp 5. Click Save. 6. In the Authorization Rules Tab, Select the Actions Tab. 7. Select Add. 8. In the Authorization Success Return Section, add a Return Attribute with the following properties: Type: HeaderVar Name: [header var name] (the default value used in the EPM Configuration Wizard i.e. EPMSSO). If a SID (Security Identifier) has been provided for the user, this will be used in place of the Username value. For details of SIDs, see Password Properties. Return Attribute: [Attribute name] e.g. cn Where [Attribute name] is the identifier that will be used to match the user names defined in EPM security, or an attribute that equates to the SID. 9. Click Save. 10. Ensure the Policy is enabled. The system should now be configured to allow SSO access to the EPM Web application. BusinessObjects Administration & Security Guide 21

24 Application Security 2 System Login Options 22 BusinessObjects Administration & Security Guide

25 Model Security

26 Model Security 3 Model Security Features 3.1 Model Security Features EPM allows a great deal of flexibility in the levels of security access that can be applied to different parts of the application. Security can be used to allow different levels of access to individual Dimension items, Grid Values, Books and actions in the Performance Optimization / Activity Analysis / IT Services Costing applications. Security access is allocated using Security Descriptors that are referenced by User Groups. Security Descriptors are labels that are attached to actions, data fields and specific components within a model. Security access levels are then assigned to these Security Descriptors to determine what users can do according to the User Groups they belong to. Different levels of security access are possible for different security actions, fields and dimension descriptors ranging from Full Access to No Access dependent on the particular Security Descriptor. Security Access Levels may be set for User groups in the Group/Descriptor Assignment screen which is described in 3.4. Users and groups are common to all models but Security Descriptors and Group assignment levels are on a per model basis (excluding the Model Administration actions). Therefore, if you have more than one model on the same database then users and user groups will be visible across all models; however security levels will not automatically be inherited across models. The exception to this is the administrator group, who automatically has full access to all security descriptors. Note: Only a member of the ADMINISTRATORS group can assign security within EPM. Group/Dimension Security Security Descriptors Group / Descriptor Assignments Books Security It is possible to export some model security settings to an XML file using the standard export procedure. For further information see: Security Export 3.2 Group/Dimension Security Group/Dimension security is intended primarily as a way of restricting access to certain parts of a dimension hierarchy. It is possible to set the default hierarchy level at which a member will be able to view a dimension. Setting a level will allow a user to see all elements at that level and below but nothing at a higher level. Note: Users and groups are common to all models but Group/Dimension access levels are set on a per model basis. Any user who is a member of the Administrators group can configure Group / Dimension security through the Group/Dimension Security screen which is accessed from the Tools Security menu. 24 BusinessObjects Administration & Security Guide

27 Model Security Security Descriptors 3 From the drop down menu the user selects the Dimension for which security is to be configured. All the existing groups are listed in the main section. To set a default access level the user highlights a group and then clicks the adjacent area under the Root Item column. This displays the hierarchy, including the attribute groups, for the selected Dimension. Apart from the Administrators and Everyone groups the default setting for all other groups is NONE. Whilst the setting for the Everyone group is set to be the top level item of the dimension then all parts of that dimension are visible to all users. In order to implement Group/Dimension security the setting for the Everyone group should be set to the lowest acceptable level of access for all users or set to none. Highlighting an element sets a default dimension for the group and the selection set by clicking outside the selection area. Changes are not finalized until the screen is closed. All the assigned levels for the selected group are summarized in a separate window on the right of the screen. 3.3 Security Descriptors Security Descriptors in EPM are used to assign security access levels to Groups. Security Descriptors are labels which can be assigned to actions, data fields or dimension elements and books within a model. Security access levels are then assigned to these Security Descriptors on a group by group basis to allow or restrict User Group access to various actions or elements within a model. Security is divided into four groups within the Security Descriptor screen. The Group level items in this screen can be expanded or contracted for display preferences by double clicking a selected Security group. The description for each security descriptor is displayed in the information area of the screen. BusinessObjects Administration & Security Guide 25

28 Model Security 3 Security Descriptors The descriptors in the Action Access and Field Access Security Groups are all pre-defined and may not be edited. The Dimension Access and Report Task Access Security Groups each contain a pre-defined descriptor which may be edited, and the groups may also have additional descriptors defined by an administrator for each particular model. Further information on the security descriptors groups is provided in the following sections: Action Access Security Group Field Access Security Group Dimension Access Security Group Report Task Access Security Group Action Access Security Group Action Access Security Descriptors are predefined actions in EPM over which you may limit a user s access. For example security levels may be assigned according to the role of a user, especially where different levels of access are required within each role (e.g. View Builder, Book Builder, Model Builder). Action Access Security is only relevant for Win32 client users. Action Access Security is mainly divided into Import / Export, Books, Model Management, Driver Analysis, Assignment functionality, Password Access and Data Alias Access. Action Access Security Descriptors and their functions are listed in Appendix B Action Access Security Group Definitions and Security Levels Field Access Security Group Field Access Security Descriptors refer to Value fields as defined on Grid layouts. Different levels of user may need different levels of access to specific values. Field Access Security Descriptors can be used to restrict access to values displayed in both the Win32 client and End User. Field Access Security Descriptors and their functions are listed in Appendix B Field Access Security Group Definitions. Tip: Field Access security works in conjunction with Dimension Descriptor security. A user must have sufficient levels of access in BOTH of these groups to edit or view Values Dimension Access Security Group Dimension Access Security Descriptors are definable security labels which can be applied to almost any Dimension line item (only excluding Currencies, Capacity Rules and User defined Rules). Default Dimension Security is the only descriptor initially available under which all Dimension items are automatically assigned when they are first created. However, personalized security descriptors may also be added to this group. Dimension Access Security Descriptors are assigned to Dimension items using the Security section of the Dimension screen item details bar. They can also be assigned to Books using the Book Security setting within the Formatting tab of specific books. To restrict access to specific Dimension items within your model, personalized descriptors must be assigned. Personalized Dimension Security Descriptors can be created by selecting either the group or another descriptor within the group, then right-click to display the context menu and select Add. A text box will pop up prompting you to enter a new Security Descriptor name and description. This facility allows you to personalize security across Dimensions. Once you have defined a Dimension Security Descriptor it will appear under this group in the Security Descriptors list and security access can now be assigned to this in the Group / Descriptor Assignment screen (see 3.4). 26 BusinessObjects Administration & Security Guide

29 Model Security Group / Descriptor Assignments 3 The name and/or description associated with any Dimension Access Security Descriptor can be amended to provide more detailed information appropriate for each action. Select the required Descriptor then click Edit Name or Edit Description to amend as required. Dimension Access Security Descriptors can be removed by highlighting the item required in the Security Descriptor area then clicking the Delete button. A message box will ask you to confirm the remove action. Selecting OK will remove the Security Descriptor. Selecting Cancel will cancel the operation and the Security Descriptor will remain. Note: Dimension Access Security Descriptors can be used in Books to restrict User Group access to specific Books. See for more information Report Task Access Security Group This group contains a single descriptor, Default Report Task Security Descriptor, which controls access to the Report Manager application. 3.4 Group / Descriptor Assignments Security is assigned to groups using the Group / Descriptor Assignments screen. In this screen all predefined and user-defined Security Descriptors are displayed with an associated Security Access Level for each group. Note: Users and groups are common to all models but Security Descriptors and Group assignment levels are on a per model basis. To view the Security Access level of a group you need to select a group in the User Groups area. Assigned security levels are then displayed next to each Security Descriptor. Security Descriptor groups can be expanded and collapsed to group level or leaf level by clicking on the group node icon. Security access levels may only be amended by members of the Administrator group. Security levels for a User Group are assigned in the following way: Select the group in the User Group area. View the required Security Descriptor by expanding the group node if necessary. Select the current Security level for that group. This will display a drop down box with all Security Levels available for that Descriptor. BusinessObjects Administration & Security Guide 27

BusinessObjects Planning Security Administrator's Guide

BusinessObjects Planning Security Administrator's Guide BusinessObjects Planning Security Administrator's Guide BusinessObjects Planning XI Release 2 Copyright 2007 Business Objects. All rights reserved. Business Objects owns the following U.S. patents, which

More information

InfoView User s Guide. BusinessObjects Enterprise XI Release 2

InfoView User s Guide. BusinessObjects Enterprise XI Release 2 BusinessObjects Enterprise XI Release 2 InfoView User s Guide BusinessObjects Enterprise XI Release 2 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,

More information

for Sage 100 ERP Business Insights Overview Document

for Sage 100 ERP Business Insights Overview Document for Sage 100 ERP Business Insights Document 2012 Sage Software, Inc. All rights reserved. Sage Software, Sage Software logos, and the Sage Software product and service names mentioned herein are registered

More information

Customer admin guide. UC Management Centre

Customer admin guide. UC Management Centre Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers

More information

User Guide. Chapter 15. Forms Engine. 1 P a g e

User Guide. Chapter 15. Forms Engine. 1 P a g e User Guide Chapter 15 Forms Engine 1 P a g e Table of Contents 1. Introduction...3 2. Form Building Basics...4 I. About Form Templates...4 II. About Form Instances...4 3. Key Information...4 4. Accessing

More information

Nexxis User Management

Nexxis User Management User Manual Version 5.0 Nexxis User Management Nexxis User Management v5.0 User Manual Copyright 2011 Labtronics Inc. Printed in Canada. Windows is a registered trademark of Microsoft Corporation. Microsoft

More information

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the

More information

econtrol 3.5 for Active Directory & Exchange Administrator Guide

econtrol 3.5 for Active Directory & Exchange Administrator Guide econtrol 3.5 for Active Directory & Exchange Administrator Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Administrator Guide. This guide is for system administrators and

More information

Total Recall Web. Web Module Manual and Customer Quick Reference Guides

Total Recall Web. Web Module Manual and Customer Quick Reference Guides Total Recall Web Web Module Manual and Customer Quick Reference Guides COPYRIGHT NOTICE Copyright 1994-2009 by DHS Associates, Inc. All Rights Reserved. All TOTAL RECALL, TOTAL RECALL SQL, TOTAL RECALL

More information

McAfee Endpoint Encryption Reporting Tool

McAfee Endpoint Encryption Reporting Tool McAfee Endpoint Encryption Reporting Tool User Guide Version 5.2.13 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local

More information

Security Administrator s Cookbook

Security Administrator s Cookbook Sitecore CMS 6 Security Administrator s Cookbook Rev: 8.28.2013 Sitecore CMS 6 Security Administrator s Cookbook A Practical Guide to Administering Security in Sitecore Table of Contents Chapter 1 Introduction...

More information

User Documentation. Administrator Manual. www.proposalsoftware.com

User Documentation. Administrator Manual. www.proposalsoftware.com User Documentation Administrator Manual Proposal Software 1140 US Highway 287, Suite 400-102 Broomfield, CO 80020 USA Tel: 203.604.6597 www.proposalsoftware.com Table of Contents Open the WebPro Viewer...

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

BusinessObjects Enterprise InfoView User's Guide

BusinessObjects Enterprise InfoView User's Guide BusinessObjects Enterprise InfoView User's Guide BusinessObjects Enterprise XI 3.1 Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects, Crystal Reports,

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide

FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide Exchange ControlPanel Administration Guide Table of Contents Top Level Portal Administration... 4 Signing In to Control Panel... 4 Restoring Account Password... 5 Change Account Details... 7 Viewing Account

More information

TeamViewer 9 Manual Manager

TeamViewer 9 Manual Manager TeamViewer 9 Manual Manager Rev 9.0-11/2013 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen teamviewer.com Table of Contents Table of Contents... 2 1 Overview... 4 1.1 About TeamViewer Manager... 4 1.2

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Administrator Guide. LANDesk Service Desk Suite

Administrator Guide. LANDesk Service Desk Suite Administrator Guide LANDesk Service Desk Suite LANDESK SERVICE DESK SUITE ADMINISTRATOR GUIDE This document contains information that is the proprietary and confidential property of LANDesk Software, Inc.

More information

Changing Passwords in Cisco Unity 8.x

Changing Passwords in Cisco Unity 8.x CHAPTER 9 Changing Passwords in Cisco Unity 8.x This chapter contains the following sections: Changing Passwords for the Cisco Unity 8.x Service Accounts (Without Failover), page 9-1 Changing Passwords

More information

Power Monitoring Expert 7.2

Power Monitoring Expert 7.2 Power Monitoring Expert 7.2 PDF version of the Web Applications online help 7ENxx-00xx-00 07/2013 PDF version of the Web Applications online help Safety information Safety information Important information

More information

SAP BusinessObjects Business Intelligence platform Document Version: 4.0 Support Package Live Office User Guide

SAP BusinessObjects Business Intelligence platform Document Version: 4.0 Support Package Live Office User Guide SAP BusinessObjects Business Intelligence platform Document Version: 4.0 Support Package 8-2013-10-31 Table of Contents 1 About this document...5 1.1 Who should read this document....5 1.2 Document history....5

More information

ADP Workforce Now Security Guide. Version 2.0-1

ADP Workforce Now Security Guide. Version 2.0-1 ADP Workforce Now Security Guide Version 2.0-1 ADP Trademarks The ADP logo, ADP, and ADP Workforce Now are registered trademarks of ADP, Inc. Third-Party Trademarks Microsoft, Windows, and Windows NT are

More information

Crystal Reports Server Quick Installation Guide

Crystal Reports Server Quick Installation Guide Crystal Reports Server Quick Installation Guide Crystal Reports Server Windows Patents Trademarks Copyright Business Objects owns the following U.S. patents, which may cover products that are offered and

More information

Unleash the Power of e-learning

Unleash the Power of e-learning Unleash the Power of e-learning Version 1.5 November 2011 Edition 2002-2011 Page2 Table of Contents ADMINISTRATOR MENU... 3 USER ACCOUNTS... 4 CREATING USER ACCOUNTS... 4 MODIFYING USER ACCOUNTS... 7 DELETING

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

Chapter 15: Forms. User Guide. 1 P a g e

Chapter 15: Forms. User Guide. 1 P a g e User Guide Chapter 15 Forms Engine 1 P a g e Table of Contents Introduction... 3 Form Building Basics... 4 1) About Form Templates... 4 2) About Form Instances... 4 Key Information... 4 Accessing the Form

More information

SQL Server Setup Guide for BusinessObjects Planning

SQL Server Setup Guide for BusinessObjects Planning SQL Server Setup Guide for BusinessObjects Planning BusinessObjects Planning XI Release 2 Copyright 2007 Business Objects. All rights reserved. Business Objects owns the following U.S. patents, which may

More information

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are

More information

Microsoft Visual Studio Integration Guide

Microsoft Visual Studio Integration Guide Microsoft Visual Studio Integration Guide MKS provides a number of integrations for Integrated Development Environments (IDEs). IDE integrations allow you to access MKS Integrity s workflow and configuration

More information

Colligo Email Manager 6.0. Offline Mode - User Guide

Colligo Email Manager 6.0. Offline Mode - User Guide 6.0 Offline Mode - User Guide Contents Colligo Email Manager 1 Key Features 1 Benefits 1 Installing and Activating Colligo Email Manager 2 Checking for Updates 3 Updating Your License Key 3 Managing SharePoint

More information

EMC Documentum Webtop

EMC Documentum Webtop EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

GP REPORTS VIEWER USER GUIDE

GP REPORTS VIEWER USER GUIDE GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Colligo Email Manager 6.2. Offline Mode - User Guide

Colligo Email Manager 6.2. Offline Mode - User Guide 6.2 Offline Mode - User Guide Contents Colligo Email Manager 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 3 Checking for Updates 4 Updating Your License

More information

PORTAL ADMINISTRATION

PORTAL ADMINISTRATION 1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5

More information

Getting Started with the Aloha Community Template for Salesforce Identity

Getting Started with the Aloha Community Template for Salesforce Identity Getting Started with the Aloha Community Template for Salesforce Identity Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved.

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Security Assertion Markup Language (SAML) Site Manager Setup

Security Assertion Markup Language (SAML) Site Manager Setup Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and

More information

Microsoft FTP Configuration Guide for Helm 4

Microsoft FTP Configuration Guide for Helm 4 for Helm 4 How to configure Microsoft FTP for use with Helm WebHost Automation Ltd http://www.webhostautomation.com/ January 2007 Doc: HELM 4.0.0.0 Complying with all applicable copyright laws is the responsibility

More information

LogMeIn Network Console Version 8 Getting Started Guide

LogMeIn Network Console Version 8 Getting Started Guide LogMeIn Network Console Version 8 Getting Started Guide April 2007 1. About the Network Console... 2 2. User Interface...2 3. Quick Start... 2 4. Network & Subnet Scans...3 5. Quick Connect...3 6. Operations...

More information

Crystal Reports Installation Guide

Crystal Reports Installation Guide Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks

More information

Logi Ad Hoc Reporting System Administration Guide

Logi Ad Hoc Reporting System Administration Guide Logi Ad Hoc Reporting System Administration Guide Version 11.2 Last Updated: March 2014 Page 2 Table of Contents INTRODUCTION... 4 Target Audience... 4 Application Architecture... 5 Document Overview...

More information

Backup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6

Backup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6 Backup Assistant User Guide NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6 Liability Disclaimer NEC Unified Solutions, Inc. reserves the right to change the specifications, functions,

More information

How to Create User-Defined Fields and Tables

How to Create User-Defined Fields and Tables SAP Business One How-To Guide PUBLIC How to Create User-Defined Fields and Tables Applicable Release: SAP Business One 8.8 All Countries English July 2009 Table of Contents Creating User-Defined Fields

More information

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM User Manual Table of Contents Introducing OWL...3 Starting to use Owl...4 The Logging in page...4 Using the browser...6 Folder structure...6 Title Bar...6

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

Installation instructions for MERLIN Dashboard

Installation instructions for MERLIN Dashboard Installation instructions for MERLIN Dashboard Contents Installation Prerequisites:... 2 Procedure to manually backup and restore Views and Settings in AxOEE Manager... 3 For XP users go to:... 3 For Vista

More information

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup

More information

Setting Up ALERE with Client/Server Data

Setting Up ALERE with Client/Server Data Setting Up ALERE with Client/Server Data TIW Technology, Inc. November 2014 ALERE is a registered trademark of TIW Technology, Inc. The following are registered trademarks or trademarks: FoxPro, SQL Server,

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

User Security in UML Models

User Security in UML Models User Security in UML Models Enterprise Architect is an intuitive, flexible and powerful UML analysis and design tool for building robust and maintainable software. This booklet explains the User Security

More information

HP ALM. Software Version: Business Views Microsoft Excel Add-in User Guide

HP ALM. Software Version: Business Views Microsoft Excel Add-in User Guide HP ALM Software Version: 12.20 Business Views Microsoft Excel Add-in User Guide Document Release Date: December 2014 Software Release Date: December 2014 Legal Notices Warranty The only warranties for

More information

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

ProSystem fx Engagement

ProSystem fx Engagement ProSystem fx Engagement Admin Guide October 2009 Copyright 2009 CCH INCORPORATED. A Wolters Kluwer business. All Rights Reserved. Material in this publication may not be reproduced or transmitted, in any

More information

Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language, in any form, by any

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

SQL Server 2005: Report Builder

SQL Server 2005: Report Builder SQL Server 2005: Report Builder Table of Contents SQL Server 2005: Report Builder...3 Lab Setup...4 Exercise 1 Report Model Projects...5 Exercise 2 Create a Report using Report Builder...9 SQL Server 2005:

More information

ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX

ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX Contents CONTENTS Chapter 1 Introduction 1-1 Welcome to Issue Track for Windows 1-1 About this Guide 1-1 Product Name 1-1 Documentation Roadmap

More information

Shavlik Patch for Microsoft System Center

Shavlik Patch for Microsoft System Center Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This

More information

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support

More information

Scheduling Software User s Guide

Scheduling Software User s Guide Scheduling Software User s Guide Revision 1.12 Copyright notice VisualTime is a trademark of Visualtime Corporation. Microsoft Outlook, Active Directory, SQL Server and Exchange are trademarks of Microsoft

More information

ImageNow Interact for Microsoft SharePoint Installation, Setup, and User Guide

ImageNow Interact for Microsoft SharePoint Installation, Setup, and User Guide ImageNow Interact for Microsoft SharePoint Installation, Setup, and User Guide Version: 6.6.x Written by: Product Documentation, R&D Date: March 2012 ImageNow and CaptureNow are registered trademarks of

More information

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the

More information

Dell Active Administrator 7.5. User Guide

Dell Active Administrator 7.5. User Guide Dell Active Administrator 7.5 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Timeless Time and Expense Version 3.0. Copyright 1997-2009 MAG Softwrx, Inc.

Timeless Time and Expense Version 3.0. Copyright 1997-2009 MAG Softwrx, Inc. Timeless Time and Expense Version 3.0 Timeless Time and Expense All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including

More information

Business Manager Company Administrator s Guide Peoples Bank Customer Support 800.584.8859

Business Manager Company Administrator s Guide Peoples Bank Customer Support 800.584.8859 Peoples Bank Business Manager Company Administrator s Guide Peoples Bank Customer Support 800.584.8859 Revised 08/2012 Table of Contents About Business Manager... 4 Overview... 4 Access Business Manager...

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Hamline University Administrative Computing Page 1

Hamline University Administrative Computing Page 1 User Guide Banner Handout: BUSINESS OBJECTS ENTERPRISE (InfoView) Document: boxi31sp3-infoview.docx Created: 5/11/2011 1:24 PM by Chris Berry; Last Modified: 8/31/2011 1:53 PM Purpose:... 2 Introduction:...

More information

Cisco WebEx Mail Administrator's Guide

Cisco WebEx Mail Administrator's Guide Cisco WebEx Mail Administrator's Guide Copyright 1997-2009 Cisco Systems, Inc. and/or its affiliated entities. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco WebEx logo are

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Webmail Instruction Guide

Webmail Instruction Guide Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with

More information

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Deltek Touch Time & Expense for GovCon. User Guide for Triumph Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or

More information

By the Citrix Publications Department. Citrix Systems, Inc.

By the Citrix Publications Department. Citrix Systems, Inc. Licensing: The License Management Console By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS

More information

Creating Reports with Microsoft Dynamics AX SQL Reporting Services

Creating Reports with Microsoft Dynamics AX SQL Reporting Services Creating Reports with Microsoft Dynamics AX SQL Reporting Services. Table of Contents Lab 1: Building a Report... 1 Lab Objective... 1 Pre-Lab Setup... 1 Exercise 1: Familiarize Yourself with the Setup...

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

Release Document Version: 1.4-2013-05-30. User Guide: SAP BusinessObjects Analysis, edition for Microsoft Office

Release Document Version: 1.4-2013-05-30. User Guide: SAP BusinessObjects Analysis, edition for Microsoft Office Release Document Version: 1.4-2013-05-30 User Guide: SAP BusinessObjects Analysis, edition for Microsoft Office Table of Contents 1 About this guide....6 1.1 Who should read this guide?....6 1.2 User profiles....6

More information

Operating System Installation Guide

Operating System Installation Guide Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating

More information

Blackbaud FundWare General Ledger Project/Grant Guide

Blackbaud FundWare General Ledger Project/Grant Guide Blackbaud FundWare General Ledger Project/Grant Guide VERSION 7.60, SEPTEMBER 2009 Blackbaud FundWare General Ledger Project/Grant Guide USER GUIDE HISTORY Date August 2000 May 2003 May 2004 December 2004

More information

Send to Network Folder. Embedded Digital Sending

Send to Network Folder. Embedded Digital Sending Send to Network Folder Embedded Digital Sending Embedded Digital Sending Legal Notice Copyright 2005 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

Managing User Security: Roles and Scopes

Managing User Security: Roles and Scopes CHAPTER 10 These topics describe how Cisco ANA implements a two-dimensional security engine combining a role-based security mechanism with scopes (groups of NEs) that are granted to users. In addition,

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Strategic Asset Tracking System User Guide

Strategic Asset Tracking System User Guide Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data

More information

Email Protection for your account

Email Protection for your account User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

BusinessObjects Enterprise XI Release 2 Administrator s Guide

BusinessObjects Enterprise XI Release 2 Administrator s Guide BusinessObjects Enterprise XI Release 2 Administrator s Guide BusinessObjects Enterprise XI Release 2 1 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,

More information

Logi Ad Hoc Reporting Report Design Guide

Logi Ad Hoc Reporting Report Design Guide Logi Ad Hoc Reporting Report Design Guide Version 11.2 Last Updated: March, 2014 Page 2 Table of Contents INTRODUCTION... 4 What is Logi Ad Hoc Reporting?... 5 CHAPTER 1 Getting Started... 6 Learning the

More information

USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3]

USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3] Pro-curo Software Ltd USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3] CONTENTS Everyday use... 3 Logging on... 4 Main Screen... 5 Adding locations... 6 Working with locations... 7 Duplicate...

More information

BUSINESS INSIGHTS EXPLORER Data at Your Fingertips

BUSINESS INSIGHTS EXPLORER Data at Your Fingertips How Do I BUSINESS INSIGHTS EXPLORER Data at Your Fingertips Access Business Insights Explorer Find Information in Business Insights Explorer Drill Into Additional Information Filter, Sort, Group, or Summarize

More information

Training Module 1: Administration (logical) (for Privia version 5.9)

Training Module 1: Administration (logical) (for Privia version 5.9) Training Module : Administration (logical) (for Privia version.9) Copyright 0 by Privia LLC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information