User Roles and Custom Security
Security Manager enables users to have limited visibility or processing capability while still accessing the functionality needed.
Appropriate security can be assigned by setting up security by the designated roles. This enables users to have the ability to have limited functionality or full access.
Custom Security
There are four Security Roles within Data Exchange Manager: Inbound, Outbound, Extract, Process. These Security Roles determine the type of processes that can be accessed by users. A user may be set up with a single Security Role, or a combination of the four.
Security Roles | |
---|---|
Inbound | Permits the process of bringing data into Data Exchange Manager and to create pending transactions. This can be either XML or CSV. |
Outbound | Permits access to XML data extracts (if available) |
Extract | Permits access to XLS/CSV data extracts (if available) |
Process | Permits pending transactions to be processed and allows Diligent Entities to be updated as a result. This is an additional permission needed above and beyond the Inbound Security Role, to allow updates to complete. |
Custom Security is required for each role and can only be configured by an Administrator.
To setup Custom Security:
- Navigate to: System Tools > Data Exchange Manager > Other > Links (section) > Configuration Manger.
The Configuration Manager screen displays.
- Select the Custom Security tab.
The Custom Security screen displays.
- Select New.
The Configuration Manager Custom Security screen displays.
- In the Specify Security by section, select either the User Role or User option.
- From the Security Key dropdown menu, select the combination of Security Roles required (if applicable).
Security Needed | Custom Security Key |
---|---|
Processing all transaction Types | Process, Inbound, Outbound, Extracts |
Process existing transactions only | Process |
Extract of Files only | Extracts |
Import files for processing | Inbound |
Extract file, update and import | Process, Inbound, Outbound, Extracts |