Skip to main content
insightsoftware Docs insightsoftware Docs
{%article.title%}
Published:
Was this article helpful?
0 out of 0 found this helpful

Data Security

Introduction

The primary goal of this feature is to use the pre-existing data security measures of the ERP, eliminating the need for users to manually configure row level and column level security within Angles Professional.

Although Angles' row level security presents a viable option, its execution requires a great deal of manual effort, making it impractical. We introduce the Inherit ERP Security functionality to address these issues.

Scope

  • Currently, this feature is supported for Oracle ERP cloud data source only.
  • Row level security, column level security, and inherit ERP security are mutually exclusive. This means that once you enable and configure inherit ERP security, both row level and column level security will be automatically disabled.
    Note:

    If ERP data security is not enabled, row level security, column level security will continue to work as-is.

    If ERP data security is enabled, but not configured (mapping Angles Pro users to ERP users is not done yet), then no rows are returned since user mapping is not yet done.

    Users can use an email ID or username for mapping Angles users to ERP users.

    If ERP data security is toggled OFF after being enabled for a while, then all restrictions are removed. Users will be able to view all rows.

    If ERP data security is toggled back ON again after being OFF for a while, configured restrictions will be considered as the earlier ERP data security configuration status is supported.

Configure ERP Data Security

  • In Angles Professional application, navigate to Manage connections and select any Oracle ERP Cloud data source one.

  • To Edit the connection, click on the 3-dot menu and this will open Edit data source flyout.

    Note:

    By default, Inherit ERP data security toggle button will be disabled (meaning that Inherit ERP Data Security is not enabled and configured for this data source)

    A screenshot of a computer

Description automatically generated

  • Toggle Inherit ERP Data Security radio button to enable.
    • Click Continue in the prompt mentioning that both row level and column level security will be disabled.

      A screenshot of a computer

Description automatically generated

  • To map Angles Professional users to ERP users, click Manage settings. This will open a ERP data security settings screen. The User will be able to add ERP emails in the middle column, associating (mapping) them to the Platform Users on the left column.

    A screenshot of a computer

Description automatically generated

    Note:

    Admins can apply filters as mentioned below:

    All users: List of all users (both mapped and unmapped) are shown (this is the filter applied by default)

    Mapped: Only mapped users are shown.

    Not Mapped: Unmapped users are shown (as shown in the screenshot below)

A screenshot of a computer

Description automatically generated

  • After the user mapping process is finished, users can click Save to finish configuring inherit ERP data security.

Enable or disable existing ERP data security:

  • Select Angles Professional > Manage connections and choose the data source that is already configured.
  • Right click on ellipses (3-dot menu).
  • Click Edit .
  • In the Edit Data Source, users can:
    • Disable the ERP data security by toggling OFF the Inherit ERP data security button.
    • Edit the ERP data security by clicking on Mapping settings.
  • Once changes are made, click Re-import and close the Edit data source flyout.

Published:

Data Security

Introduction

The primary goal of this feature is to use the pre-existing data security measures of the ERP, eliminating the need for users to manually configure row level and column level security within Angles Professional.

Although Angles' row level security presents a viable option, its execution requires a great deal of manual effort, making it impractical. We introduce the Inherit ERP Security functionality to address these issues.

Scope

  • Currently, this feature is supported for Oracle ERP cloud data source only.
  • Row level security, column level security, and inherit ERP security are mutually exclusive. This means that once you enable and configure inherit ERP security, both row level and column level security will be automatically disabled.
    Note:

    If ERP data security is not enabled, row level security, column level security will continue to work as-is.

    If ERP data security is enabled, but not configured (mapping Angles Pro users to ERP users is not done yet), then no rows are returned since user mapping is not yet done.

    Users can use an email ID or username for mapping Angles users to ERP users.

    If ERP data security is toggled OFF after being enabled for a while, then all restrictions are removed. Users will be able to view all rows.

    If ERP data security is toggled back ON again after being OFF for a while, configured restrictions will be considered as the earlier ERP data security configuration status is supported.

Configure ERP Data Security

  • In Angles Professional application, navigate to Manage connections and select any Oracle ERP Cloud data source one.

  • To Edit the connection, click on the 3-dot menu and this will open Edit data source flyout.

    Note:

    By default, Inherit ERP data security toggle button will be disabled (meaning that Inherit ERP Data Security is not enabled and configured for this data source)

    A screenshot of a computer

Description automatically generated

  • Toggle Inherit ERP Data Security radio button to enable.
    • Click Continue in the prompt mentioning that both row level and column level security will be disabled.

      A screenshot of a computer

Description automatically generated

  • To map Angles Professional users to ERP users, click Manage settings. This will open a ERP data security settings screen. The User will be able to add ERP emails in the middle column, associating (mapping) them to the Platform Users on the left column.

    A screenshot of a computer

Description automatically generated

    Note:

    Admins can apply filters as mentioned below:

    All users: List of all users (both mapped and unmapped) are shown (this is the filter applied by default)

    Mapped: Only mapped users are shown.

    Not Mapped: Unmapped users are shown (as shown in the screenshot below)

A screenshot of a computer

Description automatically generated

  • After the user mapping process is finished, users can click Save to finish configuring inherit ERP data security.

Enable or disable existing ERP data security:

  • Select Angles Professional > Manage connections and choose the data source that is already configured.
  • Right click on ellipses (3-dot menu).
  • Click Edit .
  • In the Edit Data Source, users can:
    • Disable the ERP data security by toggling OFF the Inherit ERP data security button.
    • Edit the ERP data security by clicking on Mapping settings.
  • Once changes are made, click Re-import and close the Edit data source flyout.

For an optimal Community experience, Please view on Desktop
Powered by Zendesk