Users  

<< Click to Display Table of Contents >>

Navigation:  IMS version 23.1 > IMS Admin - User Guide 23. > System >

Users  

In this topic:

 

oIntroduction to the Users module

oAccessing the Users feature

oUser Data Model

oIMS Access and Control considerations

 


 

Introduction

 

The Users module is for the management of User Accounts - including creating, modifying, and deleting them. Certain User Account actions are defined in the User Settings, which is another system module.

 

A user account has mandatory attributes like Username, Language, and Firstname. There are also optional attributes that relate to the person, functionality, and the state of the user account. A user account without a related User Group/s has no permissions and cannot access IMS.

 

When creating a new user account, the Username and Password will be equivalent and in upper case. When a Password is reset, the new Password will be set as the Username.

 

Access the Users Feature

 

From the IMS Main menu bar:

 

01-13-Users_AccessingUsers

 

Select the System option

 

then select Users and then Users again from the drop down lists

 

The User Form with an empty User tab is displayed.

 

 

User Data Model

The following is an introduction to the user access and data model in VC4’s IMS

 

 

The IMS application is a user-based system. All persons and systems require a user account to be able to use the IMS functions and data.

 

02adminUserDataModelRelation M

 

One account policy with settings, is common across all user accounts in a single IMS environment  

 

An IMS environment may consist of multiple IMS applications (websites, webservices) accessing one database where the database may contain multiple IMS schemas. The account policy is an IMS global configuration.

 

One or more user accounts exist within an IMS environment. Each user account has a password based on the account policy settings. A user account belongs to more than one user group.

 

One or more user groups can exist within an IMS environment to which certain permissions are configured that range from being able to open IMS, accessing certain forms with read only or write access, etc.

 

More details about User Access and Control is described further on in this document.

 

 

IMS Access and Control considerations

When considering allowing a user or third party system to access the IMS system, one should consider various aspects about their use of the system, this will help determine how to set up an account and what they should and should not have access to.

 

Some considerations are:

 

Role withing the organisation

Are they provisioning services, building network components, detecting faults, selling services, remodelling and designing the network; physical or logical, etc.

Responsibility

Are they creating new or deleting existing network components and services, just seeking information to perform their tasks, in charge of a department like network build, etc.

Network area

Do they need access to all sectors of the network or IMS features like Bulk loading or Reports, or just certain areas like Core connectivity (WDM, Fibre), or maybe just the Sites and Equipment.

Tasks they carry out

 

What tasks a user carries out is a great way to help determine what they need to access, as well as what level of modification to the network they should be allowed to do, i.e., add, delete, or edit.