|
<< Click to Display Table of Contents >> Navigation: IMS version 23.1 > IMS Admin - User Guide 23. > System > Users |
In this topic:
oIntroduction to the Users module
oAccessing the Users feature
oUser Data Model
oIMS Access and Control considerations
Introduction
The Users module is for the management of User Accounts - including creating, modifying, and deleting them. Certain User Account actions are defined in the User Settings, which is another system module.
A user account has mandatory attributes like Username, Language, and Firstname. There are also optional attributes that relate to the person, functionality, and the state of the user account. A user account without a related User Group/s has no permissions and cannot access IMS.
When creating a new user account, the Username and Password will be equivalent and in upper case. When a Password is reset, the new Password will be set as the Username.
Access the Users Feature
From the IMS Main menu bar:

▪Select the System option
▪then select Users and then Users again from the drop down lists
The User Form with an empty User tab is displayed.
User Data Model
The following is an introduction to the user access and data model in VC4’s IMS

The IMS application is a user-based system. All persons and systems require a user account to be able to use the IMS functions and data.
One account policy with settings, is common across all user accounts in a single IMS environment
An IMS environment may consist of multiple IMS applications (websites, webservices) accessing one database where the database may contain multiple IMS schemas. The account policy is an IMS global configuration.
One or more user accounts exist within an IMS environment. Each user account has a password based on the account policy settings. A user account belongs to more than one user group.
One or more user groups can exist within an IMS environment to which certain permissions are configured that range from being able to open IMS, accessing certain forms with read only or write access, etc.
More details about User Access and Control is described further on in this document.
IMS Access and Control considerations
When considering allowing a user or third party system to access the IMS system, one should consider various aspects about their use of the system, this will help determine how to set up an account and what they should and should not have access to.
Some considerations are:
Role withing the organisation |
Are they provisioning services, building network components, detecting faults, selling services, remodelling and designing the network; physical or logical, etc. |
Responsibility |
Are they creating new or deleting existing network components and services, just seeking information to perform their tasks, in charge of a department like network build, etc. |
Network area |
Do they need access to all sectors of the network or IMS features like Bulk loading or Reports, or just certain areas like Core connectivity (WDM, Fibre), or maybe just the Sites and Equipment. |
Tasks they carry out
|
What tasks a user carries out is a great way to help determine what they need to access, as well as what level of modification to the network they should be allowed to do, i.e., add, delete, or edit. |