User Level Access Matrix
The following table shows the Data Access Security pages and components that are accessible from each user level.
Screen Name | Administrator | Compliance Manager | Data Owner | Auditor | User |
---|---|---|---|---|---|
Dashboard | ✓ |
✓ |
✓ |
✓ |
x |
Resources | ✓ |
x |
✓ |
x |
x |
Permissions | ✓ |
x |
✓ |
x |
x |
Data | ✓ |
x |
✓ |
x |
x |
Owners | ✓ |
x |
✓ |
x |
x |
Reports | ✓ |
✓ |
✓ |
✓ |
✓ |
My reports | ✓ |
✓ |
✓ |
✓ |
✓ |
Reports templates | ✓ |
✓ |
✓ |
✓ |
x |
Compliance | ✓ |
✓ |
x |
x |
x |
Data classification | ✓ |
✓ |
x |
x |
x |
Policies | ✓ |
✓ |
x |
x |
x |
Rules | ✓ |
✓ |
x |
x |
x |
Policy objects | ✓ |
✓ |
x |
x |
x |
Application scope | ✓ |
✓ |
x |
x |
x |
Policy scope | ✓ |
✓ |
x |
x |
x |
Manage categories | ✓ |
✓ |
x |
x |
x |
Manage file properties | ✓ |
✓ |
x |
x |
x |
Forensics | ✓ |
✓ |
✓ |
✓ |
x |
Permissions | ✓ |
✓ |
✓ |
✓ |
x |
Identities | ✓ |
x |
x |
✓ |
x |
Data classification | ✓ |
✓ |
✓ |
✓ |
x |
Settings | ✓ |
x |
x |
x |
x |
Task management | ✓ |
x |
x |
x |
x |
Tasks | ✓ |
x |
x |
x |
x |
Scheduled tasks | ✓ |
x |
x |
x |
x |
Tasks auto retry | ✓ |
x |
x |
x |
x |
Account exclusions | ✓ |
x |
x |
x |
x |
Sensitive account exclusions | ✓ |
x |
x |
x |
x |
General | ✓ |
x |
x |
x |
x |
Overexposed resources | ✓ |
x |
x |
x |
x |
Import user scope | ✓ |
x |
x |
x |
x |
Admin | ✓ |
x |
x |
x |
x |
Applications | ✓ |
x |
x |
x |
x |
Permissions management | ✓ |
x |
x |
x |
x |
Data dictionary fields | ✓ |
x |
x |
x |
x |
Identity collectors | ✓ |
x |
x |
x |
x |