About User Permissions
Because of the varied nature of critical numbers, security is handled through a combination of base application security permissions and critical number category and user permissions.
Application Permissions
Application permissions are used for these forms:
- Critical Numbers
- Critical Numbers Setup
- Critical Number Categories
- Critical Number Parameters
- Critical Number Users
- Email Generation
- Snapshot Generation
Category and Critical Number Permissions
A few options exist that go beyond form permissions, such as drilldown, visibility, and parameters. You can set these up on the Critical Number Categories form, Critical Number Users form, or Critical Numbers Setup form.
Permissions | |
---|---|
Drilldown | Can the user drill down? |
Run | Can the user see this critical number? |
Parameters | Can the user update the parameters? |
Users | Can the user maintain specific user permissions? |
Recv Drill | Should the user receive drilldown details in email? |
Should the user receive this critical number in email? |
Acquiring Critical Number and Category Permissions
The critical number permissions are determined first by whether the user has a specific record set up on the critical number. If they have a record, the values specified there are used. Otherwise, permissions are determined by the value set up for the critical number category. Refer to the following table for an example of how the category and critical number permissions interact with each other.
- Yes: The user has a record set up with the flag checked
- No: The user has a record set up with the flag unchecked
- None: The user does not have a record set up
Category | Critical Number | Permission? |
---|---|---|
Yes | Yes | Yes |
Yes | No | No |
No | Yes | Yes |
No | No | No |
Yes | None | Yes |
No | None | No |
None | Yes | Yes |
None | No | No |
None | None | No |