User Level Access Matrix
The following table shows the Data Access Security pages and components that are accessible from each user level.
Screen Name | Administrator | Compliance Manager | Data Owner | Auditor | User |
---|---|---|---|---|---|
Dashboard | ✓ | ✓ | ✓ | ✓ | x |
Resources | ✓ | x | ✓ | x | x |
Permissions | ✓ | x | ✓ | x | x |
Data | ✓ | x | ✓ | x | x |
Owners | ✓ | x | ✓ | x | x |
Reports | ✓ | ✓ | ✓ | ✓ | ✓ |
My reports | ✓ | ✓ | ✓ | ✓ | ✓ |
Reports templates | ✓ | ✓ | ✓ | ✓ | x |
Compliance | ✓ | ✓ | x | x | x |
Data classification | ✓ | ✓ | x | x | x |
Policies | ✓ | ✓ | x | x | x |
Rules | ✓ | ✓ | x | x | x |
Policy objects | ✓ | ✓ | x | x | x |
Application scope | ✓ | ✓ | x | x | x |
Policy scope | ✓ | ✓ | x | x | x |
Manage categories | ✓ | ✓ | x | x | x |
Manage file properties | ✓ | ✓ | x | x | x |
Forensics | ✓ | ✓ | ✓ | ✓ | x |
Permissions | ✓ | ✓ | ✓ | ✓ | x |
Identities | ✓ | x | x | ✓ | x |
Data classification | ✓ | ✓ | ✓ | ✓ | x |
Settings | ✓ | x | x | x | x |
Task management | ✓ | x | x | x | x |
Tasks | ✓ | x | x | x | x |
Scheduled tasks | ✓ | x | x | x | x |
Tasks auto retry | ✓ | x | x | x | x |
Account exclusions | ✓ | x | x | x | x |
Sensitive account exclusions | ✓ | x | x | x | x |
General | ✓ | x | x | x | x |
Overexposed resources | ✓ | x | x | x | x |
Import user scope | ✓ | x | x | x | x |
Admin | ✓ | x | x | x | x |
Applications | ✓ | x | x | x | x |
Permissions management | ✓ | x | x | x | x |
Data dictionary fields | ✓ | x | x | x | x |
Identity collectors | ✓ | x | x | x | x |