User Access Control

<< Click to Display Table of Contents >>

Navigation:  IMS version 22.6 & 22.9 > IMS Admin - User Guide 22.6 & 22.9 >

User Access Control

Introduction

 

User Data Model

The following is an introduction to the user access and data model in VC4’s IMS

 

 

The IMS application is a user-based system. All persons and systems require a user account to be able to use the IMS functions and data.

 

02adminUserDataModelRelation M

 

One account policy with settings, is common across all user accounts in a single IMS environment  

 

An IMS environment may consist of multiple IMS applications (websites, webservices) accessing one database where the database may contain multiple IMS schemas. The account policy is an IMS global configuration.

 

One or more user accounts exist within an IMS environment. Each user account has a password based on the account policy settings. A user account belongs to more than one user group.

 

One or more user groups can exist within an IMS environment to which certain permissions are configured that range from being able to open IMS, accessing certain forms with read only or write access, etc.

 

More details about User Access and Control is described further on in this document.

 

 

IMS Access and Control Functionality

When considering allowing a user or third party system to access the IMS system, one should consider various aspects about their use of the system, this will help determine how to set up an account and what they should and should not have access to.

 

 

Role withing the organisation

Are they provisioning services, building network components, detecting faults, selling services, remodelling and designing the network; physical or logical, etc.

Responsibility

Are they creating new or deleting existing network components and services, just seeking information to perform their tasks, in charge of a department like network build, etc.

Network area

Do they need access to all sectors of the network or IMS features like Bulk loading or Reports, or just certain areas like Core connectivity (WDM, Fibre), or maybe just the Sites and Equipment.

Tasks they carry out

 

What tasks a user carries out is a great way to help determine what they need to access, as well as what level of modification to the network they should be allowed to do, i.e., add, delete, or edit.

 

The following sections will explain in more detail the usability aspect of User Access and Permission features, namely the User Account, Group, and Policy.