Download presentation
Presentation is loading. Please wait.
Published byGabriel Albert Modified over 6 years ago
1
Track 2 - Advanced Topics – River Birch A & B Thursday 10:15AM – 11:15AM Security Setup and Best Practices ▪ Data approval workflow ▪ Security setup ▪ Group managers Scott Dorner – IIM Project Manager, Hach
2
Data approval Data Approval Levels can be setup that allows you to verify and lock data. When data is entered, that data point’s approval status will be set to the current user’s Minimum Approval Level. Data can then be approved and the status of the data point is changed. If a data point’s status is outside the users approval level, that data is locked from edit/delete for that user. Calculations can be lowest of inputs or can be approved just like parameters
3
Data approval Set the range of levels that Users (and User Profiles) can edit/approve
4
Data approval Set each variable you want to use approval on. (Reg Parameters only…)
5
Data approval Interfaces. You can set what level the imported data comes in at. Many LIMS interfaces (Q13618 Generic LIMS Ole DB, Q12351 CSV…)
6
Data approval Use report options to set what to do if a report refers to unapproved data.
7
Data approval Set each variable you want to use approval on. (Reg Parameters only…)
8
User profiles User Profiles allow you to setup Facility Access, User Type, group access, user settings, etc... profile and then assign users to that profile. When the profile is changed all users in the profile will use the profile settings. This allows you to setup security for a group of users instead of editing individual user security settings.
9
Questions? In today’s 4PM session we will cover the vision of our software platform and get your feedback on your key problems and point points that you are trying to solve. In Thursday’s 4PM session our UX team will have some activities to help us better understand how you use WIMS and ways we can improve it.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.