Security levels

Security levels

Revision History
27.08.2010
Because of the updated system interface, tab pages were renamed panels. The Access settings command was excluded from the context menu in the viewing window; settings are available in the security level specification.
11.03.2011
The command to subscribe to replication was removed from the context menu.
22.12.2011
The System column was added to the data grid of the directory.
06.08.2012
The Clipboard menu was added to the context menu of the directory. A description of the multiple security levels entry window was added.
04.12.2012
The Clipboard menu was added to the data grid context menu on the Access settings panel. A description of the multiple entry window was added.
19.03.2014

To manage objects of the Tillypad XL system (e.g. devices, reports, etc.), you need to set up special rules that determine who can manage these objects and which operations can be performed on them.

To separate the objects for which you need to set up special rules, you can assign them security levels. A security level can be assigned directly to an object or group of objects or inherited from the security level of another group or object.

After you install Tillypad XL Manager, you will see two security levels created by the developer: Security level for DB administrator and Tillypad reports. These security levels are used in the initial system access settings.

The system settings define the security level inherited by default by all groups of objects and objects that do not belong to any group. Objects that belong to a group inherit the security level from said group.

The security level can be directly assigned to the object itself, e.g. a device, or to a group of objects, e.g. a stock item group. The security level assigned to a group of objects is inherited by all objects of the group unless these objects have their own security level.

Security levels are included in the access settings. The security level determines which objects are regulated by this access setting.

The user can define the list of required security levels.

To manage security levels and access settings, use the Security levels directory.