Field Descriptions

Table Information

FAQs

Users

What can I do in these screens?

Use these screens to set up user-specific data for Costpoint Web.

When the Use Web Security model for Client/Server option in the System Settings (Others » System Administration » System Settings) screen of Client Server is selected, the Maintain User and Maintain User Groups screens display all applications available for rights assignment (including those currently available in Client Server only). Also, when a user is added (or deleted) in the Web, that user is automatically added (or deleted) in Client Server. All user information common to Client Server (General Information, Workflow information, Company assignment) syncs up to Client Server automatically. User information specific to Web is excluded (Printing Defaults, Authentication & Password information).

Companies frequently limit access to these screens to system administrators, who can, via check box selections in these screens, permit users to change a limited number of data fields (such as telephone, password, and some defaults) set up in the User Preferences screen (Administration » Maintain » Users).

The main screen is divided into an identification block and a primary block that contains tabs for information, workflow, printing defaults, and authentication which function as follows:

Four subtask links are also available from these screens:

Within the Application Rights subtask, you can also drill down to assign even more specific user rights, as follows:

When should I use these screens?

Use these screens to add a new user or to edit existing user information.

If you plan to assign a default locale to a user in this screen, you must first enter locale information in the Report Locales screen (Administration » Maintain » Reports).

If you plan to assign a default printer to a user in this screen, you must first establish a catalog of printers installed in the Actuate report server that will be available for selection when printing reports from Costpoint Web.  You can do this in the System Printers screen (Administration » Maintain » Printers).

You should already have linked this user to one or more printers in the Assigned Users/User Groups table window subtask in the System Printers screen (Administration » Maintain » Printers).

If you plan to assign an employee ID to a user in this screen, you must first set up the employee in the Employee User Flow screen (People » Maintain » Employee).

If you plan to assign a default company to a user in this screen, you must first set up the company in client server in the Company Taxable Entity Information screen (Accounting » Configure » General Ledger).

If you plan to assign a default taxable entity to a company to which you have enabled user access in this screen, you must first set up the taxable entity in the Company Taxable Entity Information screen (Accounting » Configure » General Ledger).

If you plan to assign a default org security group to a company to which you have enabled user access in this screen, you must first set up the org security group in the Organization Security Groups screen.

If you plan to assign one or more user groups to this user, you must first enter user group information in the User Groups screen (Administration » Maintain » Users).

FAQs

What is the role of CPSUPERUSER in this screen?

The "CPSUPERUSER" is a special administrative user.  No rights are explicitly assigned to him, although he automatically has Full rights to all of the modules, applications, result sets, actions, and reports by default.

A system administrator can log in as "CPSUPERUSER" to assign security rights to other users.

This user is still subject to all the same restrictions as a normal user (for example, password expiration, lockout, organization security, company assignment, and so on).

What is the role of the Everyone user group?

The "Everyone" user group by default is initially set up to have full access rights to the User Preferences application (Administration » Maintain » Users).

By default, each user belongs to the "Everyone" user group, which therefore enables each user with the appropriate permissions (enabled in this screen) to modify individual choices in the User Preferences screen.

Is security shared by screens in Costpoint client/server and Costpoint Web?

Costpoint Web does not share the same security tables as Costpoint client/server.

You must set up and maintain Costpoint Web security independently from the existing Costpoint client/server security.

Use the Users screen (Administration » Maintain » Users) or the User Groups screen (Administration » Maintain » Users) to set up Costpoint Web security.

How is the security level different for screens in Costpoint client/server and Costpoint Web?

In Costpoint client/server, security rights are defined at the module level.  Application rights are inherited from module rights unless overridden at the application level.

In Costpoint Web, similarly, rights begin at the module level and flow down to the application level.  You can, however, also set up additional rights at more granular levels, including a result set level (a screen or subtask within an application,) and specific rights below the result set level, including specific Action or Report rights within a result set.

What is the relationship between a user and a user group?

In Costpoint client/server, a user can only be assigned to a single user group.  The rights granted for the user group are automatically inherited by the user unless they are specifically overridden at the user level.

In Costpoint Web, a user group acts as a role.  You can assign an individual user to one user group, to many user groups, or to no user groups.  Rights granted for the user group are automatically inherited by the user of such group unless you have explicitly defined rights at the user level as an override.

How are conflicting rights resolved by the system?

When a user has his own rights and belongs to a group or multiple groups, rights are additive across the user and user groups except when rights are set to Deny.  Deny rights override other rights assigned to that user and to the user groups linked to that user.  

For instance, if a user is given Full rights to a specific application but the user is also linked to one or more user groups that have Deny rights assigned for the same application, the user cannot access that application.

Other rights (for example, non-Deny rights) are considered additive.  If a user is assigned Read-Only rights to an application but his user groups are given Full rights to the same application, the user has Full rights to such application.

Application Rights

Application rights set at the module level are inherited at the application level. You can set an override at the application level for one or many applications in a module.  Once you have explicitly set rights for an application, such application rights will be used and module rights inherited from any other groups will be ignored.

If application rights are explicitly set for the user and user groups, those application rights are resolved together using the Deny vs. Additive rule explained above.

Result Set Rights

Result set rights determine the specific activities a user can perform within a given result set.  A result set can be a common screen used in more than one application. In such cases, the result set security applies to all applications that call that result set.  

You can grant rights for any or all of the following actions: Insert, Update, Delete, and Select.

If result set rights are not explicitly set, the following default rights are inherited from application rights:

For example, if a user has Deny rights to an application, that user is not able to view any result sets from within that application, regardless of the user's result set rights. If a user has Read-Only rights to an application, that user is not able to modify data in any result set from within that application, even with Full rights to the result set.  

Action and Report Rights Within a Result Set

Within a result set, you can give users rights to individual actions and/or reports linked to that result set. If these are not defined, the default rights are inherited from application and result set rights.

If a user has at least Read-Only access to the application and at least Select rights for the result set, the user can run a report

A user must have more then Select rights to the result set in order to be able to invoke its actions. Any additional right such as Insert/Update/Delete will be sufficient for running actions.

One exception to the rule above applies to result sets which are not editable by design. In these cases, it is impossible to have more than Select rights for the result set since it was not designed/developed for modification purposes. If an action exists for such result set, a user will always be able to run it unless his rights for running the action are explicitly revoked at the action level.

What happens if no rights are set up for a user?

You do not need to explicitly specify security rights in the database at each of the three levels in order to fully view/access applications and result sets:

In which order should I set up screens when setting up a new user?

Report Locales

System Printers

Employee User Flow

Company Taxable Entity Information

Org Security Groups

System Settings

User Groups

Field Descriptions

Identification

Use the fields in the Identification block to enter the user ID and user name.

User ID *

Enter up to 18 alphanumeric characters to specify a new user ID or use Query to select an existing user ID.

Note:  The user ID can be the same as an existing user in Costpoint client/server, but there is no requirement that it be in the database at all.

As you enter the ID, each letter displays on the screen in uppercase, even if you enter it in lowercase. This ensures that the same sequence of letters and numbers will map to one Costpoint user ID. For example, if a user enters "smithj," "SmithJ," or "SMITHJ," Costpoint will assign the attributes of Costpoint user "SMITHJ" to that user.

User Name *

Enter, or use Lookup to select, the user's name.  You can enter up to 60 alphanumeric characters in this field.  Lookup accesses the employee's name as it was entered in the Employee User Flow screen (People » Maintain » Employee), but you can edit this default as needed.

Your system administrator can, via check box selection in the Can Change Name check box in the Preferences User Can Change group box (in the Information tab), permit this user to change name data in the User Preferences screen (Administration » Maintain » Users).

* A red asterisk denotes a required field.

Information

Click this tab to open the Information screen.

Workflow

Click this tab to open the Workflow screen.

Printing Defaults

Click this tab to open the Printing Defaults screen.

Authentication

Click this tab to open the Authentication screen.

Company Access

Click this subtask link to open  the Company Access subtask.

Assigned User Groups

Click this subtask link to open the Assigned User Groups subtask.

Module Rights

Click this subtask link to open the Module Rights subtask.

Application Rights

Click this subtask link to open the Application Rights subtask.

Table Information

Changes to these screens update the following tables:

W_USER_UGRP_LIST (User Group List - Web)

W_USER_GRP_USERS (User Group User - Web)

W_USER_COMPANY (User Company - Web)

W_MODULE_RIGHTS (Module Rights - Web)

W_APP_RIGHTS (Application Rights - Web)

W_RS_RIGHTS (Result Set Rights - Web)

W_ACTION_RIGHTS (Action RS Rights - Web)

W_RPT_RIGHTS (Report RS Rights - Web)

Top of Page