Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Security helps you control access to information within Celoxis. Security in Celoxis is determined by 3 simple things

  • What role a user plays (Workspace- Role membership)
  • Privileges for that role (Grant, Deny, Unspecified)
  • Within what context (Company vs Object level)

In large organizations, workspace provide a way to group users and projects. Workspaces provide a way to segregate, view and control information. In Celoxis, users play specificSet Single User Workspace Role Membershipsroles within WorkspaceWorkspace. For example, a user may be 'Staff' of the Accounts workspace, but also play an 'Accountant' role across the other workspace.

Roles are granted privileges to perform actions on certain information.  Actions can be "View", "Edit", "Add", "Delete" and so on. Privileges can be either a specific Grant, or a specific Deny or left Unspecified. 

Celoxis lets you set security at the Company level or at the Object level. To read more, click here.

 

  • No labels