Skip to main content Skip to complementary content

User permissions

You can grant Qlik ReplicateEnterprise Manager users different roles according to the tasks you want them to perform. Qlik ReplicateEnterprise Manager comes with the following predefined security roles: Admin, Designer, Operator and Viewer. Each role has its own set of permissions, as described in Roles and permissions. For more information on permissions, seeGranular access control

You can associate a user with a security role by adding the user to the appropriate Active Directory group or by assigning a role directly to the user. By default, the user under whose account you install Enterprise Manager is associated with the Admin role. In addition, you can fine-tune access control per user or group. For more information, see Granular access control.

As a user with the relevant permissions, you can view and change the permissions for existing users or groups, or add users or groups that do not yet exist in Enterprise Manager.

The advantage of adding groups over users is that you can assign a security role to a group as a whole, instead of to individual users, and any new user that gets added to an existing group automatically acquires the security role granted to that group.

You can also:

  • Add users as domain users that are not related to an active directory group.
  • Add local groups. However, this is not possible by default. To set up Enterprise Manager to work with local groups, perform the steps in Working with local groups.

To set user permissions using Active Directory groups, you can either create Active Directory groups with the names listed in the table below, or you can create Active Directory groups with different names. Then, add users to the groups according to the role you want them to perform.

If you create your own Active Directory groups, you need to add them to the User Permissions tab in the Settings window and set their permissions as described in Managing user permissions.

Roles and AD groups
Role Active Directory Group

Administrator

AttunityEnterpriseManager Admin

Designer

AttunityEnterpriseManager Designers

Operator

AttunityEnterpriseManager Operators

Viewer

AttunityEnterpriseManager Viewer

Effective permissions are the permissions that take effect when a user is part of more than one group, or when there is a conflict between the user's permission and the group's permission, or in the hierarchy. For details, see Inheritance and overrides.

Encrypting the User Permissions File

User permissions are stored in the following repository file:

<product_dir>\Data\cfgrepo.sqlite

To prevent unauthorized access of this file, you can encrypt it using the procedure described in Replacing the Master User Password.

Did this page help you?

If you find any issues with this page or its content – a typo, a missing step, or a technical error – let us know how we can improve!