OPPORTUNITIES
SYSTEM ADMINISTRATION "1C: Enterprise 8.2"
Irina
Morozova , Candidate for pedagogical science, Department of Information Systems
KSU A.
Baitursynov
The 1C: Enterprise provides simultaneous
operation of multiple users with a single application solution. For
differentiation of user access rights to the data base of information in the
system is a list of users who have access to this application solutions.
When connecting to another user application
solution authentication mechanism lets you know which of the users listed in
the list of users connected to the application solution. This information can
then be used to select the appropriate user interface to enable access to some
information, etc.
The system supports two types of
authentication that can be used depending on the specific challenges faced by
the administrator information database:
- Authentication by 1C: Enterprise;
- Authentication by Windows.
To perform authentication by 1C: Enterprise
user, start-up with the applied solution is to select (or enter) the username
and password matches this name:
If the password entered by the user does not
match what is stored in the information database, access to the application
decision will be closed.
When authenticating Windows, which the user does
not require any action on entering a login and password. The system analyzes on
behalf of what Windows-user connects to the application solution and, based on
this determines the appropriate user 1C: Enterprise. In this case, the
authentication dialog 1C: Enterprise does not appear if no special command line
parameter. If the user does not specify any of the types of authentication -
such a user access to the application solution is closed.
In the 1C: Enterprise is possible to create a
list of users who are allowed to work with the system.
Maintaining such a list allows you to describe the powers of the various users
of the system to access to some
information, and assign user interfaces. Member List is not
part of the application solutions, and created separately in a particular
organization in which the system is used.
Information database administrator has the
ability to add, copy, delete users, and modify user data. Creating new users is
also possible by copying existing users.
Each user can be given a name that identifies
the user in the system, the full name to be used when displaying background
information, and the order of user authentication system. In the case of
authentication 1C: Enterprise users can disable the password change.
Also, by using the options data base, you can
set the minimum length of a password, and the requirement to enter a strong
password that meets a certain set of rules. In addition, users can specify a
list of roles that are available to the user when working with applications
solutions, as well as the main interface and the language in which to display
the labels contained in the interface of applied solutions.
In the process of creating application solutions developer defines a
system of roles that exists in a particular application solutions . The
administrator can only choose among the existing application in solving roles.
Access system allows us to describe a set of rules corresponding to
positions of users or type of activity. The structure of rights determined by
the specific application solutions .
In addition to the objects stored in the database ( reference books ,
documents , records , etc.) can be defined access rights to specific fields and
records.
For example , the user can manipulate documents ( invoices, bills ,
etc.) and certain counterparties do not have access to similar documents of
other contractors.
To implement access restrictions in application solutions are special
objects - Raleigh. Role in the configuration there can be positions or
activities of different groups of users, which is designed for this
configuration .
The role determines what action, over which objects the user can perform
metadata , acting in the role.
In the process of maintaining a list of user application solution to
each user is assigned one or more roles . When a user attempts to perform
action to which he is not authorized , the action will not be performed
, and the system will display an alert box "Access violation ".
Among the actions on objects stored in the database ( reference books ,
documents , etc.) , there are actions that are responsible for reading or
editing information stored in the database. These actions include:
- Reading - obtaining records or fragments from a database table ;
- Add - add new entries without altering the existing ones;
- Change -
change existing records ;
- Delete - Delete some recordings without changing the rest.
For these actions in the role settings can be
set additional conditions to the data (restricting access to data). In this
case, on a specific object stored in the database can be performed requested
action only if the restriction of access to the data for the data object is set
to "true". Similar conditions can be set for the database tables do
not having the nature of the object (registers). For object tables and data
registers can be set different limits for different fields of the table,
allowing you to place restrictions not only on the level of database records,
but also at the level of its individual fields.