User management

Admissions, responsibilities and permissions of users in small and large enterprises are a prerequisite for the introduction of a comprehensive software solution. Commonly, sensitive data such as calculations or material maps, undisclosed characteristics, prices for buyers etc. must only be accessible by specific user groups. Also the processing of certain records is done depending on the corporate philosophy and authorisation concept by different types of users.

 

Single Sign On, LDAP & Co. are now standard requirements for information systems, as they ensure a seamless integration into the corporate environment.

 

Easy Access & User Management

The User Management in WIAM® ICE enables a flexible, individual and varied roles & rights concept for individual employees in a department, across several departments, in a corporation and also, if required, for external partners.

It builds on the tree structure of WIAM® ICE and uses this for managing users and roles. This makes it easy to use and the operation is facilitated by the recognition of its structure and equal handling. Equivalent to material & property structures, user trees are created to define and manage users and role trees to set up combinations of rights.

 

Standard Functions:   

  • Permission to read and write as
    • Standard users (read only)
    • Experts (read and write)
    • Administrators (installation by users, collectives, features, trees and more.)
  • Management of users within the system
  • Management of users outside the system, for example Active Directory, single sign on, Windows Kerberos
  • Restricted access to various data fields, for example metals, plastics, composites, etc.

 

Flexible user management

The simple user management distributes reading, editing & administrative rights to users. In addition, the advanced user management allows a far greater adaptability by setting filters, such as maturity levels & release statuses, collection & property tables and confidentiality levels. It is entirely dependent on the individuals’ business authorisation concept to define which filters should be set in addition to reading and editing permissions. It can be determined by the definition of workflows, if there is no specific internal company user management.

 

Additional functions:

  • Numerous combinations of rights through permissions for individual data areas with distinct reading and editing rights
  • Authorisation for individual records (for example, tables) within data fields
    • Data for developers
    • Data for simulation & calculation
    • Data for management/administration
    • Data for buyers
    • Data for marketing & sales
    • Data for interns, students, etc.
  • Representation of complex role management systems within and outside the system
  • Confidential data areas and restrictions depending on the release status
  • And many more

 



Back