© Tillypad, 2008-2017
Revision History | |
---|---|
27.08.2010 | |
Because of the updated system interface, tab pages were renamed panels. The Access settings command was excluded from the context menu in the viewing window; settings are available in the security level specification. | |
11.03.2011 | |
The command to subscribe to replication was removed from the context menu. | |
22.12.2011 | |
The System column was added to the data grid of the directory. | |
06.08.2012 | |
The Clipboard menu was added to the context menu of the directory. A description of the multiple security levels entry window was added. | |
04.12.2012 | |
The Clipboard menu was added to the data grid context menu on the Access settings panel. A description of the multiple entry window was added. | |
19.03.2014 |
To manage objects of the Tillypad XL system (e.g. devices, reports, etc.), you need to set up special rules that determine who can manage these objects and which operations can be performed on them.
To separate the objects for which you need to set up special rules, you can assign them security levels. A security level can be assigned directly to an object or group of objects or inherited from the security level of another group or object.
After you install Tillypad XL Manager, you will see two security levels created by the developer: Security level for DB administrator
and Tillypad reports
. These security levels are used in the initial system access settings.
The system settings define the security level inherited by default by all groups of objects and objects that do not belong to any group. Objects that belong to a group inherit the security level from said group.
The security level can be directly assigned to the object itself, e.g. a device, or to a group of objects, e.g. a stock item group. The security level assigned to a group of objects is inherited by all objects of the group unless these objects have their own security level.
Security levels are included in the access settings. The security level determines which objects are regulated by this access setting.
The user can define the list of required security levels.
To manage security levels and access settings, use the directory.