23.12.2014 Views

Cleopatra Enterprise - Cost Engineering

Cleopatra Enterprise - Cost Engineering

Cleopatra Enterprise - Cost Engineering

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Administrator training<br />

4.1.9 Conclusion<br />

We have now finished the tutorial in which we looked at the different security types and how they can be<br />

used. We hope you have found it informative and useful.<br />

Now you have completed the security section of the course you will now be able to do the following in<br />

<strong>Cleopatra</strong> <strong>Enterprise</strong>:<br />

1. Setup user security:<br />

How to create new <strong>Cleopatra</strong> <strong>Enterprise</strong> users.<br />

How to edit their user properties.<br />

How to create the different user roles you recognize within you own company.<br />

How to setup the permissions for these roles.<br />

How to setup the security for the reports.<br />

2. Setup folder security:<br />

How to create workgroups.<br />

How to create folder structures for your various projects.<br />

How to setup the security for these folders.<br />

3. Setup workflow:<br />

How to create a workflow design.<br />

How to create workflow roles.<br />

How to setup the permissions for the workflow roles.<br />

How to add documents to a workflow and how to move documents between different workflow<br />

states.<br />

Of course, this is just a small overview of the capabilities of the security within <strong>Cleopatra</strong> <strong>Enterprise</strong>. Every<br />

company has its own demands regarding security. We hope you are triggered to investigate more. If so,<br />

please have a look at our "Manual" where are all topics are covered in detail.<br />

68

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!