Running user and user group reports
User and User Group reports allow you to review information for both users and groups within the system. Information supplied by the reports will include names, descriptions, last login activity and a password update history through to system access in terms of authorization and symbol access.
This chapter contains information on following main topics:
- User Reports
- User Group Reports
- User Access Report
- User Group Access Report
- Effective User Access Report
User Reports
You can run a report to review information about the users in your system.
To run a user report:
- In the navigation pane, click Administration
- Expand Security
- Expand Reports
- Select Users. The users report opens in the workspace.
The number of rows returned and the time and date stamp of when the report was generated will appear at the top of the report, along with four tabs:
User information
The user information tab provides general information about the users in your system. This report contains the following columns:
Column | Description |
---|---|
User Name | User’s name |
User Domain | User’s domain |
User Description | User’s description |
User Status | The status will be one of:
|
First Name | User’s first name |
Last Name | User’s last name |
User’s email address | |
Office Phone | User’s office phone number |
Home Phone | User’s home phone number |
Last Login | The last time the user logged into the system |
Last Updated | The last time the user’s information was updated (i.e: user’s description or email) |
Created | The date the user was created |
User password activity
The user password activity tab provides information on when user’s have changed their password. This report contains the following columns:
Column | Description |
---|---|
User Name | User’s name |
Password Update History | The date the user changed their password. Multiple password changes would be shown as separate lines in the user password activity tab. |
User authorizations
The user authorizations tab provides information on the user’s authorizations in the system. This report contains the following columns:
Column | Description |
---|---|
User Name | User’s name |
Authorization Name | The name of the authorization |
Authorization Description | The description of the authorization |
Restricted to Group | The user group to which the authorization is restricted to. This only applies to user administration authorizations. For example, a user may only have the USERRESETPASSWORD authorization restricted to the SampleFinanceGroup. |
Authorization Last Updated | The date the authorization was last updated. |
User attributes
The user attributes tab provides information on the user’s attribute settings in the system. This report contains the following columns:
Column | Description |
---|---|
User Name | User’s name |
Attribute Name | The name of the attribute |
Attribute Description | The description of the attribute |
Attribute Value | The value of the attribute set on the user |
Default Numeric Value | The numeric default for this attribute (if the attribute is of a numeric type) |
Default String Value | The string default for this attribute (if the attribute is of a string type) |
User Group Reports
You can run a report to review information about the groups in your system.
To run a user group report:
- In the navigation pane, click Administration
- Expand Security
- Expand Reports
- Select User Groups. The User Groups report opens in the workspace.
The number of rows returned and the time and date stamp of when the report was generated will appear at the top of the report, along with three tabs:
Group information
The group information tab provides general information about the groups in your system. This report contains the following columns:
Column | Description |
---|---|
Group Name | Group’s name |
Group Description | Group’s description |
Created | The date the group was created |
Last Updated | The last time the group’s information was updated (i.e: group description) |
Group authorizations
The group authorizations tab provides information on the group’s authorizations in the system. This report contains the following columns:
Column | Description |
---|---|
Group Name | Group’s name |
Authorization Name | The name of the authorization |
Authorization Description | The description of the authorization |
Restricted to Group | The user group to which the authorization is restricted to. This only applies to user administration authorizations. For example, a group may only have the USERRESETPASSWORD authorization restricted to the SampleFinanceGroup. |
Authorization Last Updated | The date the authorization was last updated. |
Group members
The group members tab provides information about what users belong to which groups. This report contains the following columns:
Column | Description |
---|---|
Group Name | Group’s name |
Group Description | Group’s description |
User Name | User’s name |
User Domain | User’s domain |
User Description | User’s description |
User Access Report
You can run a report to review information about user access in your system.
To run a user access report:
- In the navigation pane, click Administration
- Expand Security
- Expand Reports
- Select User Access
- Select the user you want to view the access for, or select All Users to view all user access.
- The User Access report opens in the workspace.
The number of rows returned and the time and date stamp of when the report was generated will appear at the top of the report.
This report contains the following columns:
Column | Description |
---|---|
User Name | User’s name |
Dimension | The dimension the user has access to |
Symbol | The symbol the user has access to |
Access Type | Whether the user has write (W) or read (R) access to the symbol |
Access Priority | The priority for the symbol access, where 1 is the highest priority. For example, if a user has read-only access to a leaf symbol with a priority of 1, but write access to that symbol’s parent with a priority of 50, the user will have write access to all symbols under the parent with the exception of that read-only leaf symbol. Note: A priority of 0 gives precedence to any other non-zero value. |
Access Level | How many levels of child symbols below the symbol the user has access to |
Inherit | If this is enabled, the user has all symbol access assigned to the V3_Compatible_Access role in that dimension. Note: For more information on symbol access roles, see the Longview Application Administrator Guide. |
Role Name | The name of the access role |
User Group Access Report
You can run a report to review information about user group access in your system.
To run a group access report:
- In the navigation pane, click Administration
- Expand Security
- Expand Reports
- Select User Group Access
- Select the group you want to view the access for, or select All Groups to view all user group access.
- The User Group Access report opens in the workspace.
The number of rows returned and the time and date stamp of when the report was generated will appear at the top of the report.
This report contains the following columns:
Column | Description |
---|---|
Group Name | Group’s name |
Dimension | The dimension the user group has access to |
Symbol | The symbol the user group has access to |
Access Type | Whether the user group has write (W) or read (R) access to the symbol. |
Access Priority | The priority for the symbol access, where 1 is the highest priority. For example, if a user group has read-only access to a leaf symbol with a priority of 1, but write access to that symbol’s parent with a priority of 50, the user group will have write access to all symbols under the parent with the exception of that read-only leaf symbol. Note: A priority of 0 gives precedence to any other non-zero value. |
Access Level | How many levels of child symbols below the symbol the user group has access to. |
Inherit | If this is enabled, the user group has all symbol access assigned to the V3_Compatible_Access role in that dimension. Note: For more information on symbol access roles, see the Longview Application Administrator Guide. |
Role Name | The name of the access role |
Effective User Access Report
You can run a report to review information about the effective user access in your system bringing together user and group access as it applies to the selected user. This is especially helpful when a user belongs to multiple user groups.
To run a user access report:
- In the navigation pane, click Administration
- Expand Security
- Expand Reports
- Select Effective User Access
- Select the user you want to view the access for, or select All Users to view all user access
- Select the group you want to view the access for, or select All Groups to view all group access
- The Effective User Access report opens in the workspace.
The number of rows returned and the time and date stamp of when the report was generated will appear at the top of the report.
This report contains the following columns:
Column | Description |
---|---|
User Name | User’s name |
Group Name | Group’s name |
Dimension | The dimension the user has access to within that user group. |
Symbol | The symbol the user has access to within that user group. |
Access Type | Whether the user has write (W) or read (R) access to the symbol with that user group. |
Access Priority | The priority for the symbol access within that user group, where 1 is the highest priority. For example, if a user has read-only access to a leaf symbol with a priority of 1, but write access to that symbol’s parent with a priority of 50, the user will have write access to all symbols under the parent with the exception of that read-only leaf symbol. Note: A priority of 0 gives precedence to any other non-zero value. |
Access Level | How many levels of child symbols below the symbol the user has access to within that user group. |
Inherit | If this is enabled, the user within that user group has all symbol access assigned to the V3_Compatible_Access role in that dimension. Note: For more information on symbol access roles, see the Longview Application Administrator Guide. |
Role Name | The name of the user access role |