How to Run User Security Report?
  • 2 Minutes to read
  • Dark
    Light
  • PDF

How to Run User Security Report?

  • Dark
    Light
  • PDF

Article summary

Administrators must deploy the report by accessing the Standard Reports page. To run the User Security report, follow the steps below:

  1. Navigate to Maintenance > Report Administration > Standard Reports.
  2. Select the checkbox next to User Security.
  3. Click Run.
  4. Select the user for which you want to view all security privileges, and click Run.

The following describes the fields on the User Security report output page.

  • Send Email: Open the Email page and email the report to one or multiple recipients.
  • User: Select a user and click Run to rerun the report for the newly selected user from the report interface itself.
  • Percentage list box: Select the percentage of the report to view. You can also select to view by page width or the whole page.
  • Select a format:
    • XML file with report data
    • CSV (comma delimited) – If you select this option, the Level names will not be included in the output.
    • PDF – Not recommended due to the number of columns this report generates.
    • MHTML
    • Excel
    • Tiff
    • Word – Not recommended due to the number of columns this report generates.
  • Export: Select this option to export the report in any format of your choice.
  • User Name: The name of the user for which you are running the report.
  • User Email: The email address for the user for which you are running the report.
  • Navigation Role: The role assigned to the user via the Navigation Role page. Navigation roles allow users to access specific navigation paths, which provides them with access to certain application pages and associated functionality. Learn more about navigation roles here.
  • Reporting Role: The role assigned to the user via the Add or Edit User Management page. There are two roles; regular user and reporting administrator. Learn more about the navigation role here. Learn more about reporting roles here.
  • Status: Indicates whether the user is active or inactive. Users must have an active status to access the Planful application.
  • Locked Status: Indicates whether the user is locked or unlocked. The user must have an unlocked status.
  • Authentication Mode: The way the Planful application authenticates the user when the user attempts to perform certain actions.
  • Support Role: The role assigned to the user via the Add or Edit User Management page. The number of available Administrator support roles is based on your Service Level Agreement (SLA). Select whether the user you are adding needs an Administrator support role or a User support role.
  • Task Manager Role: The role assigned to the user via the Add or Edit User Management page. There are two roles you can assign for Task Manager; Regular User and Admin User. Learn more about Task Manager Roles here.
  • Created Date: This column records the date and time when the user was created.
  • Created By: This column indicates the user who created the entry/user.
  • Modified Date: This column records the most recent date and time when the user was modified.
  • Modified By: This column identifies the user or system entity that last modified the user.
  • Level: The report displays entity hierarchy security privileges for up to 15 levels. If the user has security privileges for more than 15 levels, an alert message will be displayed while generating this report.
  • Approval Role: The role is assigned to the user via the Add or Edit Approval Role page. Approval roles allow users to perform budget activities for an entity. Users with varying levels of user responsibility for budget entities should be set up using Approval Roles. For example, when a user has access to two entities (A and B), but has HR responsibility for entity B only you can restrict the user to only view specific data based on HR access for the approval role assigned for the entity. Learn more about approval roles here.

Was this article helpful?