<< Click to Display Table of Contents >> Viewing user security modification history |
Access: User management > Tools > User security modifications
Things to remember ▪Only the users who have complete access to the application's User management section (User management > User profile > Access to functions) have access to the User security modification function. ▪Your company’s application manager has the authority to give users certain rights of access. |
1If you have not selected a user yet, the application will bring you to the User list screen to select one.
2Under Filters, define your search by using the available fields. For example, use the dates to target specific pay periods.
Things to remember ▪Further details regarding the filters: oFile: allows you to select a specific file. For example, Access to companies, Access to reports, Contact, etc. The list content is based on the user’s rights. oEntity: defines the file item for which the search is made. For example, if you select Access to functions and the Reports entity, only the report modifications appear on the list. oField: is accessible only if a file is selected and will help refine your search according to the field. For example, if you selected Access to functions, the list will only show Access to functions fields (access, access mode, access type). oPerson in charge: indicates the first and last name of the user who made the modifications. If you contact our customer service to reinitialize a password, the name of the person in charge will be “**Support**”. ▪The Entity and Person in charge filters will search all the descriptions containing the characters entered, whether in upper case, lower case or accent characters. ▪The Value before and the Value after will indicate “*Classified*” when modifications are made to the password or to the personal message. |
3Click on Refresh.
4Under Modification list, the details of each modification are displayed.
5Click on . In the Update Detail window, modify the Reason and add notes, if needed.
▪To add an item to the Reason drop-down list, select “Add item” and complete the field.
Important The modification history for a deleted user profile will not be included in the user security modification list since they will no longer exist in our system. However, the deleted user’s history will be available in the Report Generator. |