Skip to content
Logo

Administration

Group management

Extended Group Roles

Contains information about the available group roles: "System identifier of the group role", "Full name of the group role", "Short name of the group role", "List of identifiers of group roles included in the role."

  • Field "System identifier of a group role" - is set automatically when creating a group role and is a unique value.

  • The "Full name of the group role" field displays the real name in the system: the name of the database and the role.

  • Field "Short name of the group role" - is set when creating a group role.

  • The "List of identifiers of group roles included in the role" field contains a list of system identifiers of roles that are children of this one.

Change group role settings

  1. When each role is expanded, its parameters are available for viewing.

  2. The field "Short name of the group role" can be changed, the remaining parameters cannot be changed.

  3. After changing the parameters, you should save by clicking on the "Save" button under the parameters.

Dependent Group Roles

  1. If you go to the subsection "Included group roles", then for the selected group role, a list of roles that are children of it will become available.

Group roles

The subsection "Group roles" contains a truncated version of the section " Extended group roles ", namely the fields "Full name of the group role", "Short name of the group role".

  • Field "Full name of the group role" - contains the "Short name of the group role", as well as the system name.

  • Field "Short name of the group role" - is set when creating a group role.

Change group role settings

  1. When each role is expanded , all parameters available in the "Advanced group roles "section are available for viewing.

  2. The field "Short name of the group role" can be changed, the remaining parameters cannot be changed.

  3. After changing the parameters, you should save by clicking on the "Save" button under the parameters.

Dependent Group Roles

  1. If you go to the subsection "Included group roles", then for the selected group role, a list of roles that are children of it will become available.

Linking an identifying attribute to a group

  • The "Group role name" field displays the full name of the group role, the value of which will be assigned the value of the external group.This field is not editable.

  • The field "Link to the column attribute (floating value)" contains the key to the table with external groups.

  • The Group field contains a key for a group role.

Creating Links

In order to create a relationship between an external group and a group role, you need:

  1. Create a foreign key on a column in the table that will be used as a delimiter for policies.(see the User Manual, clause 4.6.4. Adding a column - a foreign key).

  2. In the section "System Management" ---> "Group Management" ---> "Linking an identifying characteristic to a group".At the bottom of the table, click the "Add" button.

  3. In the form that appears, in the "Group" field, select the group for which the policy will be applied from the drop-down list.

  4. Click the "Save" button.

user management

Additional Information

The "Additional Information" subsection contains personal information about users and consists of the following fields: "key", "User", "Surname", "First name", "Middle name", "Structural unit", "Position", "Phone", " e-mail ".

  • The "key" field contains the user ID and is populated automatically.

  • The "User" field contains the user login in the program.

  • The Last Name field contains the user's last name.

  • The Name field contains the username.

  • The Middle Name field contains the middle name of the user.

  • The "Unit" field contains the name of the unit to which the user belongs.

  • Field "Position" contains the position occupied by the user.

  • The Phone field contains the user's telephone number.

  • The "e-mail" field contains an e-mail by which a user can be contacted.

Adding Information

  1. In order to enter personal information about the user, go to the section "System Management" ---> "User Management" ---> "Additional Information".

  2. In this section at the bottom of the table, click the "Add" button.

  3. In the window that appears, fill in the fields "Last name", "First name", "Middle name", "Structural unit", "Position", "Phone", "e-mail".In the field "user expand the list and select from the available".

  4. Save the entered data by clicking on the "Create" button under the form.

If everything was successfully saved, a corresponding message will appear in the upper right corner, and a new line with the entered data will appear in the list.

Grouping a user

The subsection "Binding a user to a group" consists of the following fields: "User", "Group role", "User role administrator?", "Full user name", "Group role name".

  • The "User" field contains the full and short name of the user.

  • The Group Role field contains the group to which the user is associated.

  • Field "User role administrator?"contains information about whether the user is the administrator of the selected role.If "Yes", then the field contains the symbol "flag".

  • The "Full user name" field contains the full name of the user and is not editable.

  • The "Group role name" field contains a short name for the group role and is not editable.

In order to bind a user to a group:

  1. Go to the "System Management" section ---> "User Management" ---> "Binding a user to a group and click the" Add \ "button at the bottom of the table.

  2. In the "User" field, select a user from the list of existing ones or create a new one by clicking on "+".

  3. In the "Group role" field, select a group role from the list of existing ones or create a new one.

  4. Indicate whether the selected user is the administrator of the selected group role.If "Yes", then put the "flag" symbol.

  5. Click the "Create" button.

After that, the table displays the relationship between the user and the group role.

Users

This subsection reflects information about the user account in the program.The subsection consists of the following fields: "Full name of the user", "Short name of the user", "Password (display during input)", "IP address", "DB administrator", "Password is valid until ...", "User active? "," User locked manually? "

  • The "Full user name" field contains the name of the user in the program.

  • The "Short name of the user" field contains the user login specified at creation.

  • The "Password (display during input)" field contains the password for the user account.The password is not visible to the administrator.There is a display of the entered password.

  • The IP Address field contains the IP address from which the user can log in.If this field is empty, then the account works without binding to the IP address.

  • The DB Administrator field indicates whether the user is an administrator.If "Yes", then the symbol "flag" is marked and this user has the ability to create other users.

  • The "Password is valid until ..." field contains the date by which the user can log in using the specified password.If there is no value in this field, the expiration date of the record is not limited.

  • Field "User active?"indicates whether the user account is locked out.The account can be blocked by the administrator (manually) or after the password expires (automatically).

  • Field "User locked manually?"Allows you to forcibly block a user account.If the user is blocked, then the "flag" symbol is indicated opposite the field, and the "User active" field automatically accepts the value "No".

Logging

Logging (logging) of user actions.The information in this section is read-only.

In this subsection, only those actions are recorded that are aimed at modifying data (inserting a new record, updating, deleting, as well as errors in the execution of functions and stored procedures).The "User Requests" subsection contains the following fields: "Log Time", "User", "Database Request", "Error Text".

  • The "Logging time" field contains the full date (day, month, year), as well as the time (hours, minutes, seconds) of the command ..

  • The "User" field contains the username of the user who performed the action.

  • The "Database query" field contains an SQL-query to the database, formed as a result of the user action.

  • The "Error text" field contains the text of the fixed error when it appears.

In this subsection, all attempts to authorize users in the program are recorded.The “User Login” section contains the following fields: “User Name”, “Login Time”, “IP Address”, “Logout Time”, “Successful Login Attempt”, “Session ID”.

  • The "Username" field contains the user login in the program.

  • The "Logon time" field contains the full date (day, month, year), as well as the time (hours, minutes, seconds) of the user entering the program.

  • The "IP address" field contains the address from which the login was made.

  • The "Logout time" field contains the full date (day, month, year), as well as the time (hours, minutes, seconds) of the user's exit from the program.

  • The "Successful login attempt" field contains information about the login attempt: "Yes" if the attempt is successful, and "No" if the attempt is unsuccessful.In this case, the "logout time" is not set.

  • The Session ID field contains the identification number of each session.

DB structure

Group Policy

These policies allow you to restrict users to the sets of rows that can be returned by regular queries, added, changed, and deleted by commands that modify the data.This subsection contains the following fields: "Table", "Policy Name", "Group Role", "Group Role (not ed.)", "Policy Type", "Policy for Sampling", "Policy for Editing", "Current Column tables "," Search table "," Field for selection "," Condition (current user by default) "," Policy condition (manual entry) ".

  • The "Table" field indicates the table to which the access policy will apply.

  • The "Policy Name" field contains the name of the access policy in the program.The field is filled in automatically and is not editable.

  • The "Group role" field contains the name of the role for which the access policy will work; if the group role is not specified, then the policy will work for everyone (public)

  • The "Group role (not ed.)" Field displays the full name of the group role as it is recorded in the program.

  • The "Type of policy" field indicates for what type of operation the selection is performed (delete, add, update, selection, or for all at once).

  • The "Selection policy" field contains the generated condition that is used for the selection policy.The field is filled in automatically and is not editable.

  • The "Editing policy" field contains the generated condition that is used for all policies aimed at modifying data in the program.The field is filled in automatically and is not editable.

  • The "Column of the current table" field indicates the column of the table for which the policy is being created.This field is necessary for filtering data for a specific user.

  • The “Search table” field contains the name of the feature matching table from the “Column of the current table” and the feature for setting the user’s membership in the allowed user group (for example).

  • The field "Field under sampling" contains the name of the field from the table specified in the "Search table" field.

  • The Condition field (current user by default) contains the value by which data will be fetched for the user.By default, this field contains the user from the "Field by which to select" field

  • The "Policy condition (manual entry)" field contains an SQL query for manual policy installation.If there are entries in this field, the fields "Column of the current table", "Search table", "Field by which the selection is made", "Condition (current user by default)" are automatically ignored.

Adding Policies

Database copyright schemes

This subsection contains the following fields: "System ID of the scheme", "Name of the scheme", "Owner of the scheme", "Users of the scheme with rights (JSON)", "Custom name of the scheme".

  • The System Schema Identifier field contains the identifier of the scheme in the program.This field is not editable.

  • The "Name of the scheme" field contains the name of the scheme, the identifier of which is indicated in the "System identifier of the scheme" field.

  • The "Owner of the scheme" field contains the full and short name of the owner of this scheme.

  • The "Users with rights (JSON) schema" field contains information about users or group roles that have access to this schema, as well as the level of access.This field is not editable.

  • The "Custom schema name" field contains the schema name specified at creation.

Mailing list

E-mail

The subsection contains the following fields: "Email subject", "Email text", "Time for creating the email", "Date of sending the email", "Error", "Array of parameters", "Array of parameter values", "Email distribution template", "Address , "Ready to send."

  • The Email Subject field contains the subject of the email.When using the template, the theme specified in the template is used.

  • The "Email text" field contains the text of the letter. When using the template, the text specified in the template is used.This field can be edited using html tags.

  • The field "Time to create a letter" is generated automatically when you create an entry.

  • The "Date of sending mail" field contains the date when the mail server managed to send this letter.

  • The "Error" field contains the text of the error if there were errors when sending the letter.

  • The "Mailing list template" field contains a template that will be sent to users.

  • The "Destination" field contains information about the user to whom the e-mail will be sent.Information is taken from the section "System Management" ---> "User Management" ---> "Additional Information".

  • The "Ready to send" field contains information about the readiness of the message for sending.If the checkbox is selected, then the message will be sent to the send queue; if not, it will be marked as a draft.

Email Templates

In this subsection, you can create and edit mail templates.The subsection contains the following fields: "Template alias", "Message subject", "Template name", "Template text".

  • The "Template alias" field contains the name of the created object for display in the program.

  • The Subject field is similar to the subject when sending messages through mail services.Contains a title for the letter.

  • The "Template Name" field contains a title for displaying brief information about the template in the program.

  • The "Template text" field contains directly the text of the template that will be sent to users.The text in this field can be edited using html tags.

Create Template

  1. In order to create a template, go to the "System Management" ---> "Mailing List" ---> "Email Templates" section.

  2. At the bottom of the table, click the "Add" button.

  3. In the form that appears, fill in the fields "Template alias", "Message subject", "Template name", "Template text".

  4. Save the entered data using the "Create" button under the form.

Upon successful saving, the corresponding green notification will appear in the upper right corner.

Template change

  1. In order to change the template, go to the "System Management" ---> "Mailing List" ---> "Email Templates" section.

  2. In the list of templates, select the desired one and change the data in the form that appears.

  3. Save the changes by clicking on the "Save" button located under the form.

Upon successful saving, the corresponding green notification will appear in the upper right corner.

Settings

This section contains the global settings of the program, such as "Period for updating account passwords", "Period for clearing logs", "SMTP server address", etc. The section consists of the following fields: "Parameter", "Parameter value", "Description", "Date of last event."

  • The "Parameter" field contains the name of the parameter in the program.

  • The Parameter Value field contains the value assigned to the parameter.The field may contain, number, link or text.

  • The Description field contains a description of the parameter, including additional information, such as units of measure or recommendations for customization.

  • The "Date of the last event" field contains the date of the last execution of the process, taking into account this setting.

Color chart

This section contains a color palette and consists of the "Color Name" field.

  • The Color Name field contains a color heading and also has a fill color corresponding to the heading.<! - [`7.1.Setting color by condition`] () ->{= html}

Employee Account

Section "Personal account of the employee" contains information available to the user.Each user can only see information about themselves.This section consists of the following fields: "Login", "New password", "Confirm new password", "Last name", "First name", "Middle name", "Structural unit", "Position", "IP address", " Phone "," e-mail "," Account expiration date ".

  • The "Login" field contains the user login in the program.The field is not editable.

  • The "New password" field is intended for changing the password.

  • The "Confirm new password" field is used to confirm the changed password.

  • The Last Name field contains the user's last name.

  • The Name field contains the username.

  • The Middle Name field contains the middle name of the user.

  • The "Unit" field contains the name of the unit to which the user belongs.

  • Field "Position" contains the position occupied by the user.

  • The IP address field contains the address from which the user logs into the program.

  • The Phone field contains the user's telephone number.

  • The "e-mail" field contains an e-mail by which a user can be contacted.

  • The "Account expiration date to" field sets the date and time until which an entry into the program can exist through the account.After the expiration date, the account is blocked.