User - processing of generated files
The automatically generated files are processed in MS Excel with the help of UserObj_Report.xls, which is placed in the installation directory, subdirectory Utils.
After opening the file UserObj_Report.xls, the first sheet is actually a form to generate a report.
The options Date from and Date to define the period, from which the changes will be transferred to the report. If Date from is not defined, all changes up to Date to will be transferred. If neither Date from nor Date to are not defined, all changes will be transferred. This filter does not relate to the original object configuration.
After clicking the button Generate report, dialog box opens to choose the directory that contains the generated XML files. Select a particular directory and click on OK button.
Then all XML files are loaded automatically into the second sheet (Data).
Parameters (columns) in table
The table is divided into two parts – operations and configuration parameters (the header of columns has different colors).
The meaning of the columns:
Operations
Column in report | Meaning |
---|---|
ID | HOBJ of the user in the D2000 System. |
Name | User name in the D2000 System. |
Log time | Timestamp of the operation. |
Operation | Type of operation. |
Success of operation | Flag of success of executed operation. |
Comment | A comment (additional information). |
Number of incorrect password entries | Number of incorrect password entries. |
Blocked till | Time until the account is blocked. |
Process | Name of the process (D2000 object) that executed the operation. |
Workstation | Name of workstation from which the operation was done. |
Type of operations
Type | Export of configuration | Description |
---|---|---|
CHANGE_MACROS | yes | Change of user macros in the D2000 HI. |
CHANGE_PASSWORD | yes | Change of user password in the D2000 HI. |
CHANGE_USER_SETTINGS | yes | Change of user settings in the D2000 HI. |
CONFIGURE_NEW_USER | yes | Create a new user in the D2000 CNF. |
CONFIGURE_SAVE_USER | yes | Change of user configuration in the D2000 CNF. |
CONFIGURE_SAVE_USER_PWD | yes | Change of user configuration and password in the D2000 CNF. |
CONFIGURE_DELETE_USER | yes | Deleting of user. |
XML_IMPORT_NEW_USER | yes | Create a new user by XML Import. |
XML_IMPORT_SAVE_USER | yes | Change of user configuration by XML Import. |
XML_IMPORT_SAVE_USER_PWD | yes | Change of user configuration and password by XML Import. |
LOGON_USER_LOGON1) | no2) | User logon. |
LOGON_USER_LOGOFF1) | no | User logoff. |
INITIALIZATION_FILE | yes | The initial configuration – file UserName_000000000000000.xml. |
1) As regards the LOGON_USER_LOGON and LOGON_USER_LOGOFF the user name in the header corresponds to the object name in the configuration. The other operation has different name for a user who done the operation (header) and a user whose configuration was changed (configuration).
2) If user logs on after password expiration but he is still in the limit of permitted logons, also the user configuration is changed, i.e. whole configuration is exported.
Configuration parameters
They are derived from the configuration parameters of object User.
The meaning of columns in the table (they come after the columns about operations):
Column in table [value] | Configuration parameter in D2000 |
---|---|
Name | Name of the D2000 object |
Full name | Full name |
Administrator [TRUE/FALSE] | Administrator |
Logon disabled [TRUE/FALSE] | Disable logon |
Limited to | Limited to... . |
Time out | Time out [min]. |
Enable empty password | Enable empty password. |
Max. time of validity | Max. time of validity [days] |
Password expires | Password expires on |
Change password [TRUE/FALSE] | Change password at login |
Menu | Menu |
Delimit ext. references [TRUE/FALSE] | Use delimits external references |
Configure the objects "User" [TRUE/FALSE] | Allow to configure objects of User type |
Composition | Composition |
Macros [values separated by comma] | Macros |
Enabled activities [values separated by comma] | Actions enabled in HI |
Authentication methods [values separated by comma] | Authentication methods |
Group of objects [values separated by comma] | Assigned groups of objects |
0 komentárov