User Roles and Custom Security

Security Manager enables users to have limited visibility or processing capability while still accessing the functionality needed.

Appropriate security can be assigned by setting up security by the designated roles. This enables users to have the ability to have limited functionality or full access.

Custom Security

There are four Security Roles within Data Exchange Manager: Inbound, Outbound, Extract, Process. These Security Roles determine the type of processes that can be accessed by users. A user may be set up with a single Security Role, or a combination of the four.

Security Roles
Inbound Permits the process of bringing data into Data Exchange Manager and to create pending transactions. This can be either XML or CSV.
Outbound Permits access to XML data extracts (if available)
Extract Permits access to XLS/CSV data extracts (if available)
Process Permits pending transactions to be processed and allows Diligent Entities to be updated as a result. This is an additional permission needed above and beyond the Inbound Security Role, to allow updates to complete.

Custom Security is required for each role and can only be configured by an Administrator.

To setup Custom Security:

  • Navigate to: System Tools > Data Exchange Manager > Other > Links (section) > Configuration Manger.

The Configuration Manager screen displays.

  • Select the Custom Security tab.

The Custom Security screen displays.

  • Select New.

The Configuration Manager Custom Security screen displays.

  • In the Specify Security by section, select either the User Role or User option.
  • From the Security Key dropdown menu, select the combination of Security Roles required (if applicable).
Security Needed Custom Security Key
Processing all transaction Types Process, Inbound, Outbound, Extracts
Process existing transactions only Process
Extract of Files only Extracts
Import files for processing Inbound
Extract file, update and import Process, Inbound, Outbound, Extracts