Skip to main content
Version: ⭐ OpCon (Cloud - Current)

User Security Overview

Theme: Overview | Who is it for? System administrators who manage OpCon user access and security

What Is It?

OpCon uses role-based access control (RBAC) to manage what each user can see and do. User security configuration includes authentication settings, role and privilege assignments, departments, access codes, and audit log access.

When Would You Use It?

  • You need to control (RBAC) to manage what each user can see and do using OpCon uses role-based access

Why Would You Use It?

  • Centralized control: OpCon uses role-based access control (RBAC) to manage what each user can see and do

When would you use this section?

  • Creating or modifying user accounts
  • Assigning or changing role memberships and privileges
  • Configuring SSO or reviewing authentication settings
  • Restricting which schedules, machines, or scripts a user can access
  • Reviewing audit logs for compliance or troubleshooting

What is in this section?

TopicDescription
AuthenticationLogin, password reset, and external token generation
RBACRoles, privileges, and the Access Management screen
Managing RolesCreate, copy, delete, and modify role definitions
Managing UsersCreate, copy, delete, and modify user accounts
DepartmentsOrganize jobs and schedules into departments for targeted access control
Access CodesRestrict access to specific jobs and schedules using access codes
AuditingView and search audit logs and schedule build history

CAUTION: Granting the All Administrative Functions privilege gives a user full control of OpCon. Assign this privilege only to trusted administrators.

Glossary

TermDefinition
Audit LogA record of all changes made to OpCon objects, including the date, user, data changed, original value, and final value.
PrivilegeA permission that controls which actions a user can perform or which resources a user can access in OpCon.
RBAC (Role-Based Access Control)A security model in which user permissions are assigned through roles rather than directly to individual users, simplifying access management.
RoleA named collection of privileges that can be assigned to one or more user accounts. Users in a role inherit all of that role's privileges.
ScheduleA named group of jobs in OpCon that represents a business process. Schedules are built each day based on their defined frequencies and calendars.
Schedule BuildThe process by which OpCon creates daily schedule instances from master schedule definitions, applying frequencies, calendars, and properties.
SSO (Single Sign-On)An authentication method that allows users to log in once and access multiple applications without re-entering credentials.
TokenA reference to a property value using the [[ ]] syntax. The SAM replaces tokens with their runtime values when processing jobs.

Security Considerations

Authentication

OpCon supports login via a username and password (manual login) and via automatic login using the user's network account name. SSO (Single Sign-On) is also a supported authentication method, configurable per deployment.

Authorization

OpCon uses role-based access control (RBAC). All permissions are granted through roles assigned to user accounts. Granting the All Administrative Functions privilege gives a user full control of OpCon; this privilege should be assigned only to trusted administrators.

Departments, access codes, and schedule/machine/script privileges allow administrators to restrict which jobs, schedules, machines, and scripts each role can access or manage.

Data Security

Audit logs record all changes made to OpCon objects, capturing the date, user, data changed, original value, and final value. Access to audit logs is restricted to users with the appropriate privilege and can be reviewed for compliance or troubleshooting purposes.

FAQs

Q: What does the User Security Overview cover?

OpCon uses role-based access control (RBAC) to manage what each user can see and do. User security configuration includes authentication settings, role and privilege assignments, departments, access codes, and audit log access.

Q: Why should the "All Administrative Functions" privilege be assigned with caution?

Granting the All Administrative Functions privilege gives a user full control of OpCon. Because this privilege bypasses granular restrictions, it should be assigned only to trusted administrators.

Q: What information does an OpCon audit log entry capture?

Audit logs record all changes made to OpCon objects, capturing the date, user, data changed, original value, and final value. Access to audit logs is restricted to users with the appropriate privilege and can be reviewed for compliance or troubleshooting purposes.