Introduction
Security roles allow you to quickly assign the appropriate permissions and actions to users in an environment. We have designated four security roles:
- System Administrator
- Administrator
- Model Designer
- Advanced Contributor
The table shows each security role's module access:
Security Role | Apps | Modeler | Administrator | System |
---|---|---|---|---|
System Administrator | X | X | X | X |
Administrator | X | X | ||
Model Designer | X | X | ||
Advanced Contributor | X |
System Administrators are added through the System module, while the rest of the roles are defined through the Application module. Manage the rest of the roles by going to Administrator > User & Group > Membership.
Tip: To learn more about customized roles, please refer to the Administrator Overview article.
System Administrator
System Administrators have unlimited access to all aspects of the system. System Administrators can create new Applications and access all pages. They also have the ability to impersonate any user in the system.
Add additional System Administrators through the Administrator tab in the System module.
In the event that no System Administrators exist within Kepion, you can assign one directly through the database. The relevant table is selected below:
Administrator
Users in the Administrator role can manage both user security and workflow. For data security, Administrators can grant user access to Models and Dimensions. For workflow, they manage workflow configurations (e.g., assigning users as Contributors, Approvers, and Reviewers; Form and Rule associations; and workflow filter groups). Administrators can also lock plans to prevent additional data changes in the Application.
Model Designer
Users in the Model Designer role can manage the core modeling aspects of an Application, including creating new Dimensions, Hierarchies, and Models. The Model Designer role is also allowed to manage Forms, Rules, and Model variables, as well as Application deployment
Advanced Contributor
The Advanced Contributor role can use advanced features/functions, such as transactional drill-through.