General and Entity-Dependent Security Profiles

Note:  Administrator permissions are required to access the General Security Profile form and the Entity-Dependent Security Profile form.

For instruction on General and Entity-Dependent Security profiles, click the following links or use the scroll bar to scan the page.

Overview

To Edit Profile Permissions

To Establish General and Entity-Dependent Security Profiles

Object-Level Security Profiles

Setting Field-Level Security

 

Overview of General and Entity-Dependent Security Profiles

General Security profiles govern authorization to security objects (usually forms and reports) and elements (form sections and fields) for which there is no dependency on Enterprise Entities. Entity-Dependent Security profiles govern authorization to security objects and elements where there is a dependency on Enterprise Entities. Both profiles are used to grant access to and specify usage privileges (read, update, add, delete) for each object/element within a module. For example, suppose five employees need to enter daily monitoring data in the software and generate summary reports. First, define a profile that provides access to just the monitoring data forms and the reports they need, as well as grants Read, Update, and Add user authorization. Then assign the profile to the five employees who enter the data. These employees would only be able to open and add or update the information in the forms and reports that are part of the profile.

Security elements are typically fields and sections on forms. Assigning element user privileges can further limit user access to important or sensitive information. However, in specific modules, less restrictive user privileges can be assigned for specific security elements. Refer to Setting Field-Level Security for additional information.

Security elements apply to select forms within Essential. A security object with available security elements appears as a link in the General Security and Entity-Dependent Security profiles.

The specific access rights for each permission option are provided below:  

Permission

Access

Read

Can only view data; cannot edit, add, or delete information on this form, or in this section or field.

Update

Can edit information on this form, or in this section or field.

Add

Can add information on this form, or in this section or field.

Delete

Can delete information on this form, or in this section or field.

None

Cannot open this form, or view this section or field.

 

General Security profiles are established on the General Security Profile form. Entity-Dependent Security profiles are set up on the Entity-Dependent Security Profile form and are associated with Hierarchy Security profiles. General Security profiles and Hierarchy Security profiles are assigned to users on the User Manager form. The profiles can be edited at any time. Updated information will apply to all users assigned the profile. New profiles for a module can also be established as needed.

The permissions granted in the General Security profile and the default Entity-Dependent Security profile designated in the Hierarchy Security profile determine which security objects/elements are available to a user. The minimum level of authorization, i.e., Read permissions, must be assigned for a security object to be available. For example, if no permissions are granted for the Entity Compliance Owner object, the Compliance Owner field will not be displayed on the Enterprise Entity form. If no permissions have been assigned to the Materials object, the Material form link will not appear in the Navigation Tree. When all of the objects in one of the folders in the Navigation Tree are not granted permissions, the entire folder will not be displayed. Refer to Overview of Security and Access Profiles for additional information and more comprehensive security examples.

To establish General and Entity-Dependent Security profiles

  1. Click Administration > General Security Profiles or Entity-Dependent Security Profiles in the Navigation Tree.

    The Security Profiles list appears.

  2. Click the New button.

    The Security Profile form is displayed.

  3. Enter the Profile Name.

  4. Select a Module from the list and click Save.

    The Object Permissions section is displayed. Each object (typically forms and reports) associated with the chosen module is displayed as a line item.

  5. Use the guidelines below to provide access and grant read, update, add, and/or delete user permissions for security objects. Refer to Setting Field-Level Security to include element security.

  1. Click Save.

  2. Repeat steps 2 through 6 to establish other profiles.

Setting Field-Level (Element) Security

Security elements are typically fields and sections on forms (security objects). Assigning element user privileges can further limit user access to proprietary, important or sensitive information. For example, on the Task Setup and Results form, you may want to prohibit edits to the Due Date field while allowing updates to task progress- and status-related fields. The Read, Update, and Add usage privileges are available for security elements. When the privileges assigned to the security object are more restrictive than those assigned to the elements associated with the object, the object's security settings override the elements'. For example, if Read permissions are assigned for the Task Setup and Results form and Read and Update permissions for the Due Date field, the field will be Read only because the form's (object) security is more restrictive and, thereby, overrides the field's (element) security.

Element Security for Document Links and Attachments

Element security that allows users with limited form access the ability to modify document links and attachments associated with the form can be assigned in the Air, Audit, Compliance Manager, Task Manager, and Water modules. The object's security settings will not override the element settings for document links/attachments-related sections. For example, this functionality can be useful when you want to allow users read-only privileges for existing tasks or permits, but grant the same users authorization to modify the document links/attachments associated with those tasks or permits. In this example, just Read usage privileges are assigned to the security object and Read, Update, and Add usage privileges are assigned to the document links/attachments-related security element.

Note:  Security elements apply to select forms within Sphera Essential. A security object with available security elements appears as a link in the General Security and Entity-Dependent Security profiles.

To set field-level security

  1. Locate the profile on the applicable Security Profiles list, click the profile link to open the Security Profile form, and expand the Object Permissions section when necessary.

  2. Click the security Object link to display the object's available elements.

  3. Use the following guidelines to provide access and grant read, update, add, and/or delete user permissions:

  1. Click Save.

To edit profile permissions

  1. Locate the profile on the applicable Security Profiles list, click the profile link to open the Security Profile form, and expand the Object Permissions section when necessary.

    Each object associated with the chosen module is displayed as a line item.

  2. Use the following guidelines to edit access and user permissions:

  1. Click Save.

Object-Level Security Profiles

The following General and Entity-Dependent security profiles have been recently added or updated for objects in Essential.

Module

Object Name

Release Introduced

Administration

Global Task Settings

7.8

Air

Create Entity Material Parameter Template

7.7

Create Organizational Boundaries Template

7.7

Create Production Parameter Template

7.7.2

Review Products by Substance

7.7.2

Permits Supervisor Console

7.8

Audit

Create Audit Template

7.7.2

Async Process Engine Log

7.8

Corrective Action Supervisor Console

7.8

Findings, Recommendations, Observations, Good Practices

7.8

Chemical Inventory

Create Production Parameter Template

7.7.2

Create Substance Exemption Template

7.7.2

Create Substance Registration Template

7.7.2

Create SVT Exempt Reason Template

7.7.2

Create SVT Legal Entity Template

7.7.2

Legal Entities

7.7.2

Legal Entity Registration

7.7.2

Review Products by Substance

7.7.2

Sphera IA Import

7.7.2

Sphera IA Import Errors / Warnings

7.7.2

Substance volumes by Legal Entity

7.7.2

Substance volumes for non-registered and non phase-in substances

7.7.2

Substance volumes for phase-in substances

7.7.2

Substance volumes for specific registered substances

7.7.2

SVT

7.7.2

SVT Report Calculations

7.7.2

Threshold Band Information

7.7.2

Web Service Validation Errors

7.7.2

Compliance Manager

Async Process Engine Log

7.8

Bulk Update Controls 7.8
Control Priorities 7.8
Create Entity Material Parameter Template 7.8
Create Production Parameter Template 7.8
Permit Supervisor Console 7.8
Review Products by Substance 7.8

Compliance Parameter Data Entry

Create Entity Material Parameter Template 7.7
Create Production Parameter Template 7.7.2

Compliance Parameter Management

Review Products by Substance 7.7.2

Emergency

Incident Location 7.7

FEMS

Create Production Parameter Template 7.7.2
Review Products by Substance 7.7.2

Incident

Review Products by Substance 7.7.2
Async Process Engine Log 7.8
Corrective Action Supervisor Console 7.8

Industrial Hygiene

Review Products by Substance 7.7.2

MDS Author

Review Products by Substance 7.7.2

MDS Manager

Review Products by Substance 7.7.2

Process Data Manager

Review Products by Substance 7.7.2

Waste

Create Entity Material Parameter Template 7.7
Create Bulk Waste Disposal Template 7.7.1
Create Production Parameter Template 7.7.2
Review Products by Substance 7.7.2
Async Process Engine Log 7.8

Water

Create Entity Material Parameter Template 7.7

 

Create Production Parameter Template 7.7.2

 

Async Process Engine Log 7.8

 

Permit Supervisor Console 7.8

 

Review Products by Substance 7.8

 

 

Related topics

 Hierarchy Security Profiles

 

 User Security Management

 

 Overview of Security and Access Profiles