User Configuration

As an administrator, you control access to RL6 through the user profile. Attributes that determine how the user logs in to the system, where widgets and icons appear on a page, which pages are accessible and what files are available for viewing are associated with the user profile. You may track the use of RL6 with the Audit Log and may be required to unlock files so that other users can access them.

RL6 uses various security configuration points:

  1. Security Policy (page 1) – configure the security policy to determine how users login, including the complexity setting for passwords, when they should be changed and which page is displayed after successful login.
  2. Roles – determine the pages and business functions available through the roles assigned to the user profile. Roles are a combination of module, license (Viewing License Information), role (Roles), scope (Scope Definitions), and forbidden fields (Forbidden Fields).
    1. AdministratorClosedThe person in charge of managing and maintaining RL6. Defined – restrict access further by defining your own roles, scopes and forbidden fieldsown roles and scopes.
    2. System Defined – when you upload the license file, these attributes are created.
  3. Review – track user interaction with files and other system components using the Audit Log (Audit Logs) and view and manage locked files (File Locks).
  4. Templates Info Centre Homepages customize the look and feel of the application by creating and assigning Icon Wall templates, Views and Dashboard Groups to the users.