The tool supports interface of Foresight Analytics Platform 9 or earlier.

Distributing Privileges

To distribute privileges between system users, use the Privileges section on the navigation panel.

NOTE. When roles of information security administrator and application administrator are separated, the Privileges section is available only for information security administrator.

The Privileges section:

There is a list of default privilege holders next to each privilege. The owner of the ADMIN schema is included in the Administrators built-in group and inherits a set of privileges of this group.

Description of system privileges:

Login

Changing user permissions, distributing roles, changing policy

Changing security label and access control list of any object. Browse all objects in the navigator

Read and open all objects

Clear access protocol

View access protocol

Creating and deleting users

Disconnecting users

Applying user permissions at DBMS level

Login to object navigator

Access to update manager

Privileges are distributed by:

To distribute privileges:

    1. Select a privilege.

    2. Click the Add button on the Privilege Holders side panel.

After executing one of the operations the Privilege Holders dialog box opens:

After executing the operations the Select Groups and Users/Search Groups and Users dialog box opens to add holders of the selected privilege.

To delete the selected privilege holders, click the Delete button in the Privilege Holders dialog box in the desktop application and on the Privilege Holders side panel in the web application.

NOTE. If a domain user/group is selected as the privilege holder, which is not created in Foresight  Analytics Platform, the process of creating a domain user/domain group will be started.

To apply the specified privilege settings:

NOTE. If section parameters have been changed, an attempt to go to another section of the security manager or to close it displays a request to apply changed settings.

See also:

Setting Up System Security Policy | Setting Up Object Access Permissions | Setting Up User Action Auditing