Users represent individuals who use the system. Various privileges can be assigned to users to grant them the ability to read and alter data and system behaviour.
There are two basic user levels: administrators (), and other users
(
). Administrators have access to all system functionality. Other users have
various privileges based upon configuration.
To add a new user, click the icon. The user will not actually be added until it is
successfully saved. To edit an existing user, click the user's name in the "Users" list.
Passwords are not retrievable once they have been saved; they can only be reset by specifying a new password.
A disabled user is not allowed to log in. To delete a user, click the icon.
To test a user's email address, click the icon. This will cause an email to be sent
to the specified email address.
Users may have alarm notification emails sent to their email addresses without explicitly being specified on an email event handler. Selecting a Send alarm emails alarm level above "none" will cause these notifications to be sent when the event's alarm level is greater than or equal to the user's minimum alarm level, but only when the event is raised (i.e. no escalation or inactive notifications). Note also that if the user is already specified on an email event handler, they will not be sent multiple emails.
Hide menu option can be checked only on user who is not an administrator. If this option is checked, after logging in user will only see an icon associated with user's homeUrl if defined and icons: Users, Logout, Help, App theme, Language.
HomeUrl is set after clicking on icon "Make this my default page" and admin can edit this property for specific user. Examples:
views.shtm?viewId={}
events.shtm
Theme - Default or Modern theme can be selected. By this option we can set application theme per user which will be visible after logging in.
The Administrator checkbox determines if this user is an administrator.
If the user is not an administrator, all data sources for the customer will be listed. Checking the box next to the data source name indicates that the user can alter the data source settings, as well as access all data produced by that data source.
If the data source is not checked, a list of all points within the data source will be displayed. Each point can be individually set for no access, read access, or—if the point is settable—write access. (Having write access implies have read access.)