Configuration menu

This is the main configuration screen where Security Configurations are defined and managed. This screen lists all the available Security Configurations created represented by the configuration's name and remarks added to it. A Security Configuration may either be defined from scratch or copied from an existing Security Configuration. Only administrators has the privilege to create or make any amendments.

A Security Configuration is a customized group of rules/commands applicable to a specific user/group of users. For each Security Configuration, the following rules/commands can be controlled to be applied to different users or user groups according to their security status.

  • Editable/uneditable and show/hide tables
  • Editable/uneditable and show/hide fields
  • Right to use a gINT commands
  • Right to use an add-in commands
  • Show/hide gINT applications or its groups
  • Approve Tool related fields and tables

A configuration is independent of a database or project, and can be applied to multiple individual projects, databases or at instance level.

Example 1: A Security Configuration may be defined to apply on projects meant for archive which would not allow users to edit but only view data.

Example 2: A Security Configuration may be created and applied to current production projects where some users has limited rights to enter data, view tables related only to their area of work, limited rights to check, review or delete data, limited rights to modify report templates or full control of the entire database.



Configuration screen


CaptionTypeDescription
NameColumnSecurity Configuration name. Mandatory.
RemarkColumnAdditional related information.
Add new recordActionAdds a new empty row for new configuration input.
SaveActionUpdates any changes made.
CancelActionUndo any changes made.
DeleteActionRemoves selected configuration.
DetailsActionStep into details of corresponding configuration.
CopyActionLaunch window to select existing Security Configuration to copy from.


A complete explanation about how to manage a configuration is detailed in Setting up a Security Configuration.