About User Permissions

Because of the varied nature of critical numbers, security is handled through a combination of base application security permissions and critical number category and user permissions.

Application Permissions

Application permissions are used for these forms:

  • Critical Numbers
  • Critical Numbers Setup
  • Critical Number Categories
  • Critical Number Parameters
  • Critical Number Users
  • Email Generation
  • Snapshot Generation

Category and Critical Number Permissions

A few options exist that go beyond form permissions, such as drilldown, visibility, and parameters. You can set these up on the Critical Number Categories form, Critical Number Users form, or Critical Numbers Setup form.

Permissions  
Drilldown Can the user drill down?
Run Can the user see this critical number?
Parameters Can the user update the parameters?
Users Can the user maintain specific user permissions?
Recv Drill Should the user receive drilldown details in email?
Email Should the user receive this critical number in email?

Acquiring Critical Number and Category Permissions

The critical number permissions are determined first by whether the user has a specific record set up on the critical number. If they have a record, the values specified there are used. Otherwise, permissions are determined by the value set up for the critical number category. Refer to the following table for an example of how the category and critical number permissions interact with each other.

  • Yes: The user has a record set up with the flag checked
  • No: The user has a record set up with the flag unchecked
  • None: The user does not have a record set up
Category Critical Number Permission?
Yes Yes Yes
Yes No No
No Yes Yes
No No No
Yes None Yes
No None No
None Yes Yes
None No No
None None No