User Administration

Creation of the Users, Roles and Permission access to the screen of LIMA. Permissions for Roles to access at table level and also to access Highly Confidential tables to users by generating key.


User Role Management

The Dashboard displays the information about incoming file status, report generation, data exports along with CPU and RAM utilization percentages. Dashboard contains all hyperlink module names where each module navigates to its respective pages.

Dashboard overview

Steps to create a user to access LIMA

Step 1

Once admin login, click on User Administration menu in top bar, which redirect to the User Administration page.

Dashboard overview

Step 2

Click on ‘Create User’ assign required fields where user id is unique and click on ‘Save User Profile’

Dashboard overview

User can search for the created user as below

Dashboard overview

User can edit the created user fields by clicking on edit option

Dashboard overview

Change the fileds as user requirement and click on ‘Update User Profile’.


Steps to create role and assign screen permissions to the created role

Step 1

Once admin login, click on User Administration menu in top bar, which redirect to the User Administration page.

user administration 5

Step 2

Use Create Role button to create new role and for assigning screen permissions.

user administration 6

Step 3

To create new role, enter the Role Id, Description and Is Active fields. Also, in the same popup give the screen permissions to be allowed for this role. Use Select All option if the role need to have permissions to all screens. Dashboard and Logout screens are mandatory to choose. Up on entering all the fields, click on Save Role button to create and save role permissions.

user administration 7

After click on Save Role, we will get a confirmation notification “Role created successfully!”.

user administration 8

We can see the created roles in the table, as shown in above screen shot.

Step 4

Use the below format to login in to system, as like below screenshot domain/csl

user administration 9

Role Table Access

Steps to assign table access permissions to a role group

Step 1

Once admin login, click on User Administration menu in top bar, which redirect to the User Administration page.

user administration 10

Step 2

Click on “Role Table Access” under User Administration where a user can view list of table types from LIMA.

user administration 11

Step 3

Select a role id from dropdown and select the table type. List of groups under the table type will be displayed. Select Group name, list of tables under the selected group and table type will be displayed. Select the tables. This process of table access can be provided from multiple table types, Groups and Tables.

user administration 12

After the selection click on save. Hence a user with this role id can access the assigned tables.

user administration 13

User Role Management

User Role Management (GIF)

user administration 13

Key Management

To Enable Security in Lima Using Key Management. LIMA achieves security of tables metadata by using Key Management. Here Super User can secure the table metadata to the normal user by generating a key. Steps to assign user group and/or role to a user in LIMA.

To enable RSA Security in Lima

Step 1

Login as Super admin who has all the access of modules, tables and metadata in LIMA

user administration 1

Step 2

Navigate to Internal Schema. Create a table, columns in a table and click on create table with “Highly Confidential” check

user administration 2

Creation of a table with columns will be successfully created.

user administration 201

Step 3

Import data using Data load/ Workflow/ import in data grids and data gets populated in highly confidential table created by super user.

user administration 3

Step 4

Navigate to User Administration then Key Management. Here in this screen Super User can view all the list of highly confidential tables as shown below.

user administration 4

Step 5

Select an User Id (normal user) and drag and drop the tables for which Super user wants to give access to normal user and select an expiry date and click on ‘Generate Key’.

user administration 6

Step 6

Key will be generated user can copy the text or Generate text file. Super user need to share the key to normal user if user need to see meta data of the highly confidential table.

user administration 7

After generation of key login as normal user can view table in Data grids but metadata is shown in encrypted data as shown below.

user administration 601

Step 7

Normal user can view an alert pop-up to enter the generated key in Data Grids.

user administration 8

Click on OK. Now normal user can view the data for the key generated tables.

user administration 701