Documentation

Roles and Users tabs

Use the Roles and Users tab to set up your security system.

Role-based security

In a simple security system, the administrator assigns privileges, or rights, directly to each user. But with role-based security, there is an additional layer called roles between the list of users and the list of rights.

It is easiest to understand with an example: A delivery company has several employees, and their job functions are concisely described as drivers, dispatchers, and administrative. You would set up three roles in Axisbase: driver, dispatch, and admin. You would attach rights to each of the roles. You would add users, and assign each user to one or more roles.

The advantage is that as you hire new people, you simply add a user and indicate what role the user plays, and you can delete users, and never lose information about your security policies.

In Axisbase, all users have the right to view all data, by default, and roles are used to give rights to change data. If you need to restrict rights to view, use external business logic code.

Setting up roles

Use the Roles tab in the database Properties window to set up roles.

For each role, create a detail record for each record type that the role has rights to modify, and check Edit, Create, and/or Delete to indicate the type of modification that is associated with the right.

Your roles will look something like this, with multiple detail records for each role:

x

Setting up users

After you have set up roles, set up users in the Users tab.

You can select from the dropdown list of roles, or type any number of roles separated by commas.

To set the initial password for a user, or reset it to a temporary password, enter the password in the password column. Otherwise leave it blank. If a termporary password is set, the user will be asked to change it the next time they connect.

(c) 2014-2015 Divergent Labs, Inc.