Security Role Report

The Security Role Report enables users to view security role information, as well as the permissions and constraints defined for the role. Users can only run the report for security roles to which they have access in the system.

To create Security Role reports, go to Reports > Standard Reports > System. Then, click the Security Role Report link.

Role Criteria

The Role Status field is unchecked by default. This field allows users to include inactive roles in the report output. When unchecked, inactive roles are not included in the report.

Process Report

In the Report Title field, enter a title for the report. If no title is entered, the report title defaults to the report name. The title appears on both the report output and in the Processed Reports section.

Click the Process Report link to run the report based on the selected criteria. The report output is stored in the Processed Reports table.

Processed Reports Table

The Processed Reports table displays the three most recently run reports. The report name, create date, and last run date display for each report. The following options are available for each report in the table:

  • Click the Print icon to view a printable version of the report. The report can also be printed from the printable version.
  • Click the Excel icon to generate an Excel output of the report. Note: Once the Excel icon has been pressed, the report starts processing without a visual indicator that the report is processing. Pressing the Excel icon multiple times will restart the export process each time.
  • Click the Refresh icon to refresh the report results.
  • Click the View Details icon to view and modify the filter criteria for the report.
  • Click the Delete icon to delete the report.

Output

The report data is sorted alphabetically by security role name. The only security roles that display are the roles that are available to the user.

Note: User level constraints, which are defined for individual users on the Users page, are not included in the report.

The report output includes the report criteria, as well as the following report data:

  • Role Name - This column displays the name of the role the user is in.
  • Role ID - This column displays the ID of the role the user is in. If the user has more than one role, each role appears on a separate row.
  • Parent Role - This column displays the parent role.
  • Parent Role ID - This column displays the role ID of the parent role.
  • Role Description - This column displays the description text for the role.
  • Role Type - This column displays the type of role, either static or dynamic.
  • Active - This column displays the active status of the role. The column displays "Yes" for active and "No" for inactive.
  • Permission Name - This column displays the permission name. If a role has more than one permission, each permission appears on a separate row.
  • Permission Category - This column displays the permission category associated with the permission for the user.
  • Constraints - This column displays the constraints added to a permission for each role. Constraints appearing in the role are role-specific only and do not reflect constraints set at the individual user level.
  • If more than one constraint exists for a permission, all constraints appear in the same cell, separated by a line break. If a constraint includes subordinates, the subordinates display in parenthesis to the right of the constraint name. For example, "Restricted to Corporation: Acme (include subordinates)."

  • Inherited Permissions - This column indicates whether or not a permission has been inherited from a child role. The column displays "Yes" if the permission has been inherited by the parent role from a child role, and "No" if the permission has not been inherited from a child role.

Security Security Security Security Security Security Security Security Security