Due to the various tasks and responsibilities of employees, different authorisation concepts arise. Companies often use a variety of user management solutions and wish that any newly integrated software adapts to existing solutions and integrates flexibly into the IT environment of the respective company. However, a new information system comes along with many new roles and rights, which may not be covered by an existing system.
WIAM® ICE can adopt these authorisation procedures automatically as part of a connection with Single Sign On, Windows Kerberos and the like. Alternatively, separate solutions can be created regardless of any existing user management. Whatever the chosen option, the user privileges can be restricted by setting filters on different hierarchies and on datasheet views. And even if a user is allowed to see some restricted part of data, this does not mean the data can be edited by this user. Accordingly, in an application diverse user concepts are conceivable, which govern not only visibility but also read and write access.
On the one hand, the connection to an existing user concept prevents the proliferation of user rights, roles and possibly conflicting permissions in different systems and therefore, leads to uniformity in the company. On the other hand, the independent development of an autonomous users’ role and database in WIAM® ICE supports the necessary flexibility and adaptability to changing usage situations, data manipulation and management processes. Both versions have their respective advantages and disadvantages and are successful, depending on the corporate philosophy. WIAM® can consult on the various options of access and user management depending on the company’s requirements.