February 11-13, 2019 Raleigh, NC.

Slides:



Advertisements
Similar presentations
Informer Security PRESENTER: Tim Nicholson | | March 5-6, 2012.
Advertisements

Guide to MCSE , Enhanced 1 Activity 14-1: Browsing Security Templates Objective: To become familiar with built-in security templates Start  Run.
When you combine NTFS permissions and share permissions the most restrictive effective permission applies. For example, if you share a folder and assign.
1 Chapter Overview Understanding and Applying NTFS Permissions Assigning NTFS Permissions and Special Permissions Solving Permissions Problems.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
MIS Chapter 51 Chapter 5 – Managing File Access MIS 431 Created Spring 2006.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Lesson 19 – ADMINISTERING WINDOWS 2000 SERVER : THE BASICS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
By Rashid Khan Lesson 8-Crowd Control: Controlling Access to Resources Using Groups.
Train The Trainer Employee Central Administration
1 Securing Network Resources Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions Copying and Moving Files and Folders.
Protect your data with Security John Ykema, Director of Sales & Marketing.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Microsoft Office Excel 2013 Expert Microsoft Office Excel 2013 Expert Courseware # 3254 Lesson 6: Protecting and Configuring Workbooks.
Chapter 5 File and Printer Services
Module 2 Creating Active Directory ® Domain Services User and Computer Objects.
MAE Atlassian Tool Suite Administration Training July 8 th, 2013.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Employee Central Administration
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Systems Module Slide 2 – Overview and Navigation
Module 4 Managing Access to Resources in Active Directory ® Domain Services.
Administrator – Employee Overview September, 2011.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
Moodle (Course Management Systems). Managing Your class In this Lecture, we’ll cover course management, including understanding and using roles, arranging.
0 eCPIC User Training: Dependency Mapper These training materials are owned by the Federal Government. They can be used or modified only by FESCOM member.
The New MR Repository & Security Authorization Model Ben Naphtali WebFOCUS Product Manager Architecture and Security May 2010 Copyright 2009, Information.
New MR Repository & Security Universal Object Access Brian A Suter VP WebFOCUS Product Development November 16, 2015 Copyright 2009, Information Builders.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Search Overview Search Features: WSS and Office Search Architecture Content Sources and.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Lecture 6 File, Folder and Share Security. Objectives Managing file and folder security.
NetTech Solutions Security and Security Permissions Lesson Nine.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
23 Copyright © 2009, Oracle. All rights reserved. Oracle Business Intelligence Answers: Advanced Features.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
Configuring and Managing Resource Access Lecture 5.
© 2014 Entrinsik, Inc. 1 Share and Share Alike and Other Features of Informer 4.4 Tim Nicholson Director, Informer Customer Services Entrinsik, Inc.
Please wait, Our presentation will be starting soon. Use Alt+Tab key to go to other applications while the presentation is running. Use Esc key to stop.
Lesson 14: Configuring File and Folder Access MOAC : Configuring Windows 8.1.
19 Copyright © 2008, Oracle. All rights reserved. Security.
ITMT Windows 7 Configuration Chapter 6 – Sharing Resource ITMT 1371 – Windows 7 Configuration 1.
Justin Scheitlin Daisey Fahringer
Informer 5 Teams and Security Collaborate on, Secure, and Share Content PRESENTER: Tim Nicholson| Director, Informer Customer Services| April 21, 2017.
Presented by [Harshit Agrawal] 04/03/2017
Introducing, Installing, and Upgrading Windows 7
APAN SharePoint Permissions
CONTENT MANAGEMENT SYSTEM CSIR-NISCAIR, New Delhi
APAN SharePoint Permissions
Presented by [Harshit Agrawal] 03/02/2017
Quickr Places & Templates Introduction
Creating Charts & Dashboards
Getting Started with Security
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 4: Implementing and Managing Group and Computer Accounts.
Security Schedule: Timing Topic 40 minutes Lecture 70 minutes Practice
Managing Data by Using NTFS
Basics to Know and Best Practices to Do
Chapter 9: Managing Groups, Folders, Files, and Object Security
February 11-13, 2019 Raleigh, NC.
September 12-14, 2018 Raleigh, NC.
September 12-14, 2018 Raleigh, NC.
September 12-14, 2018 Raleigh, NC.
Windows Vista Inside Out
February 11-13, 2019 Raleigh, NC.
Shawn Dorward – InterDyn Artis
Presentation transcript:

February 11-13, 2019 Raleigh, NC

Break Into Informer 4 Security Presenter: Sarah Rodger Informer Support Specialist

Agenda What Can You Secure? Informer Security Hierarchy Common Models Pitfalls to Avoid Troubleshooting Tips Q&A

What Can You Secure? Reports (Informer & SQL) Custom Export Templates Report Features (ex: Edit, Copy, Export, Delete) System Controls and Settings Archives Custom Export Templates Dashboards Datasources / Databases Mappings / Files / Tables Properties / Fields / Columns Row-level data (via plugin)

Permissions versus Sharing Sharing: who can see the report Found on the Report Template page in the “Sharing” section Can be Public, Private or Available only to groups and users listed Permissions: what they can do with it Edit, copy, export, etc.

Informer Security Hierarchy If User/Group is not listed, they inherit the “EVERYONE” or “OWNER” defaults.

Where to Secure? Security Tab: Select Users or Groups to secure See Security > Root Permissions > Select Group or User affected. Mappings Tab: Select object to secure datasource -> Overview mapping -> Overview property - > Overview Then click the “Permissions” Icon found top right. Select Group or User affected. Report Template Tab: in the top right corner… if the user has permission to make changes

Example Example: “Report Runners” Group permissions for reports against the Informer Datasource Secured by User or Group Go to: Security / Root Permissions / for Report Runners Secured by Data Go to: Mappings / Datasource / Permissions / for Report Runners User will need to logout/login to see permission changes.

Working with Users & Groups Groups and Users Local LDAP Combination Security Tab: Users: Add, Delete & Password Reset Groups: Add, Delete & Edit Membership LDAP: configure connection Only the local “administrator” account can Impersonate users

Best Practices: Group by Job Function

Better: Data Access & Job Function

More Rules? Or More Exceptions? Two primary approaches: Lock everyone out and modify to grant access Lock no one out and modify to deny access Which results in fewer modifications?

Pitfalls to Avoid The most restrictive setting wins! Best practice is to assign users to a single group

Don’t Use Overly Complex Model

Do Create Specialized Groups

Troubleshooting Tips

Add Individual User to Permissions But don’t SAVE, Just review the defaults

Run Security Audit

Run Security Audit

Run Security Audit

Useful Help Center Articles * Security Audit Report * * Researching Permission Issues * Managing Users and Groups How Informer security works Permissions Principal Types Using LDAP and Active Directory How do I limit Informer access to users in a specific LDAP group?

Thank you! Any questions?

February 11-13, 2019 Raleigh, NC