Setting up access rights and rules in Pigment is essential for data security and efficient workflow management. It requires you to determine which Member can read and write data within your model, while protecting sensitive information and allowing Members to perform their day-to-day tasks. Here we give you a step-by-step guide in setting up access rights and rules.
Where do I start?
Before setting up access rights in Pigment, it's essential to define your data security needs. Create a plan that determines which data should be hidden, readable, or writable, and that identifies the users to whom these access rights apply. A well-defined plan significantly simplifies your security and access rights set-up.
Security requirements are complex. If you require a security plan as part of your Pigment implementation, coordinate as appropriate with the following people to develop and implement your security functionality:
- your internal Security Administrators on Pigment
- your Professional Services Resources. If you don’t have any Professional Services Resources reach out to your Pigment CSM for further guidance.
Which system am I working in?
Within Pigment there are different, updated, versions of the access rights feature, so you need to determine which access rights system you’re working in. To check if you are working in the Legacy system, see Difference Between Legacy and Current Access Rights.
What permissions do I need?
You must have the Define Application security Permission. This Permission is specific to each Application.
If you’re using the default Roles set up in Pigment, Admins have this permission applied to them.
In your Application, if you see a Security folder in the Sidebar, or if you’re able to see the Roles, permissions & access tab in your Application Settings, then you have the correct permissions.
What other information do I need to know?
Ensure that you’ve read and understood the concepts discussed in the introductory topic: Introduction to Access Rights
When you’re ready to start creating access rights. see Create an Access Right Metric and Rules.