The security reports are some of the most popular reports and for good reason. They pull out security configuration data that is very difficult to view from the platform interface. For the majority of companies security is an important aspect of the implementation. One of the challenges of a system deployment is being able to see and analyze the security model as it exists over time. If you have a system with more than the simplest of security configurations, you know may understand the choir it can be to get this information.
Uses Cases
- Creating documentation for security compliance audits and analysis
- System administrator troubleshooting of user or team data access
- Security model assessments for upgrade projects
Security Reports Overview
- Users Report
- Teams Report
- Business Units Report
- Security Roles Report
- Field Security Report
- Hierarchical Security Report
- Positions Report
- Access Team Templates Report
User & Team Reports
The user and team report provide a list of all the users and all the teams in the system including their access mode, license type, business unit, territory and system Id (GUID) in Excel format. If you’ve ever run into an issue where a user or team GUID was provided in an error message this will come in handy.
Business Units Reports
The business unit reports provide a list of all business unit within the system along with each unit’s parent business unit and the number of users in each. Depending on the security configuration of your system. In the majority of systems there will be a limited number of business units, but being able to see the number of users in each business can be useful as part of an analysis.
Security Role Reports
The security role reports provide 3 perspectives of information, the list of security roles, Security Roles by Team/User and a User Pivot Table which shows roles assigned by user in a horizontal format.
Security Privilege Reports
The security privilege reports create a comprehensive view of security privileges assigned to both users and by entity. These reports are both available as a Microsoft Word based report and an export of the raw security privilege data into Excel spreadsheets. A full report is created for each user and entity.
If we take an example user Alicia Thomber, we can see all of the full set of privileges that she has been granted via the roles assigned. If we wanted to dive deeper into how she received her privileges, we can compare what roles she was assigned with the privileges of those roles from the security role reports. This is one of the best ways to troubleshoot access permissions that can happen within a system and tweak the security roles or assigned roles to correct issues.
Access Team Templates
There are two types of teams that you can use to control record access – owner teams and access teams. An access team doesn’t own records and doesn’t have security roles assigned to the team. The users have privileges defined by their individual security roles and by the roles from other teams in which they are members. The records are shared with an access team and the team members are granted access rights on the records, such as Read, Write, or Append. The access team template report displays all the team templates that are configured in your system.
Team Memberships
An owner team owns records and has security roles assigned to the team. The team’s privileges are defined by these security roles. In addition to privileges provided by the team, team members have the privileges defined by their individual security roles and by the roles from other teams in which they are members. A team has full access rights on the records that the team owns. The team membership report provides the list of all teams a user is assigned to within your system.