Introduction
CXO-Cockpit user objects are used to authorize the business users within CXO-Cockpit. Users are grouped in user groups.
In the user maintenance screen you can create and manage users.
Authentication
There are four methods for authentication. Proprietary Security, Active Directory Security, LDAP and Essbase.
- Proprietary Security is a CXO-Cockpit specific security model. User names and passwords are stored in the CXO Repository database.
- Active Directory Security allows you to authorize users according the Active Directory.
- LDAP allows you to authorize against a LDAP server
Attributes
name | Description | Mandatory | MSAD | Proprietary |
---|---|---|---|---|
User ID | Technical User name | X | X | X |
Full Name / Display Name | Users full name | X | X | |
Email Address | X | |||
Password | Password In case of MSAD a password has to be entered when the user is created, but afterwards the MS Windows credentials are used. (Active Directory Security) | X | ||
Phone | Phone number | X | ||
Location / Domain | Domain is mandatory in case of MSAD. When more than one domain is used they need to be in the same domain forest. | X | X | X |
User Group | A user is linked to a user group | X | X | X |
User must change password | CXO-Cockpit offers the option to let Passwords expire | X | ||
# Days until Password expires | Number of days until the users password expires | X | ||
Narrative Role | Read more about user roles in the User Roles Regarding Comments | X | X | X |
Draft Data | Is the user allowed to view Draft Data | X | X | |
Use Mobile Client | If mobile client is enabled |