Running reports and user proxies

Users running Birst operational reports use the same security configuration as the WFM application. For example, if a WFM system admin user named Ben is acting as a proxy user for another team's supervisor named Tom, then Ben will only be able to view/select employees for the team supervisor Tom when running reports.

The user proxy feature allows users to assume another user's privileges temporarily. In effect, the feature allows a user to "become" another user to perform transactions in the application. To become another user requires a proxy and the original user.

The original user grants their permissions in the application to a second user called the proxy. The proxy user becomes the original user within the application for a specified period. During that period, the proxy can perform transactions in the application on behalf of the original user.

For more information on setting up user proxies, see "Security user proxies, alternates, and delegates" in the System Security chapter of the Infor Workforce Management Time and Attendance Implementation and Administration Guide.