0% found this document useful (0 votes)
5 views1 page

UserNew EN

The document discusses user management in Synergy software. An administrator can create, manage, and modify all other user types by selecting their role. When creating a user, fields like username, password, name, email, and language must be filled out. Non-administrator users are given access to specific devices, pages, and tables.

Uploaded by

tukang ngaplod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views1 page

UserNew EN

The document discusses user management in Synergy software. An administrator can create, manage, and modify all other user types by selecting their role. When creating a user, fields like username, password, name, email, and language must be filled out. Non-administrator users are given access to specific devices, pages, and tables.

Uploaded by

tukang ngaplod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

4.

3 Users management

“Administrator” type user can create ( User→New), manage and modify ( User→Show) all the other users of
different type, selecting the role.

The creation of a user involves the filling of the following fields.

User name and password are used to log in, while the name and e-mail fields are identifiers within Synergy. A language
among those available can be assigned to the user.
The Web Api option enables the user to access the data logs in the database by calling the web service (see the
dedicated section in this manual).
If the user is not an "administrator" it should be given the devices, pages and tables which it can access to. Thus, after
saving the new user, enter the modification option by clicking next to the user to be modified, accessing the following
screen.

Opening the User - Devices tab, select the devices for which the user is given access rights from the list on left. The
same procedure must be followed for data logs, pages and reports.
Logging in with his credentials, the user sees only the items selected by the administrator at this stage. References to
unauthorized items are not displayed.

You might also like