Cleopatra Enterprise - Cost Engineering
Cleopatra Enterprise - Cost Engineering
Cleopatra Enterprise - Cost Engineering
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Administrator training<br />
4.1.9 Conclusion<br />
We have now finished the tutorial in which we looked at the different security types and how they can be<br />
used. We hope you have found it informative and useful.<br />
Now you have completed the security section of the course you will now be able to do the following in<br />
<strong>Cleopatra</strong> <strong>Enterprise</strong>:<br />
1. Setup user security:<br />
How to create new <strong>Cleopatra</strong> <strong>Enterprise</strong> users.<br />
How to edit their user properties.<br />
How to create the different user roles you recognize within you own company.<br />
How to setup the permissions for these roles.<br />
How to setup the security for the reports.<br />
2. Setup folder security:<br />
How to create workgroups.<br />
How to create folder structures for your various projects.<br />
How to setup the security for these folders.<br />
3. Setup workflow:<br />
How to create a workflow design.<br />
How to create workflow roles.<br />
How to setup the permissions for the workflow roles.<br />
How to add documents to a workflow and how to move documents between different workflow<br />
states.<br />
Of course, this is just a small overview of the capabilities of the security within <strong>Cleopatra</strong> <strong>Enterprise</strong>. Every<br />
company has its own demands regarding security. We hope you are triggered to investigate more. If so,<br />
please have a look at our "Manual" where are all topics are covered in detail.<br />
68