Tools → Security Manager

About the Security Manager

The Security Manager allows you to create and manage users and groups so as to both enable sharing and restrict access. Using built-in Security Roles, you are able to assign access permissions to groups of users. Known as a Role Based Access Control (RBAC), you can easily enforce access to certain features and functionality within Incorta.

Using the Security Manager

By default, the Super User (the Tenant Administrator) has the SuperRole, which is covered in security roles. Roles are immutable permission settings that can be applied to groups. You cannot create, edit, or delete a role. As a user with the ability to manage security, you create groups and assign permissions to them using one or more roles. You can assign one or more groups to a user to give them the desired permissions.

Security Role Management

Incorta’s security model is optimistic, meaning that Incorta enforces the least restrictive role permissions and access rights.

Role Based Access Control

Role Based Access Control (RBAC) enforces access to certain features and functionality within the Incorta Analytics Service. There is no direct way to assign a role to a user, with two exceptions:

  • All users inherit the User role.
  • A tenant administrator inherits the SuperUser role unless otherwise configured for the tenant.

In Incorta, a user belongs to zero or more groups, and a group is assigned to zero or more roles.

Note

While RBAC, through permissions, controls access to features and functionality, access rights refer to the individual access to an object. For example: The user Tom gives access rights to Rachel to view a dashboard Tom has created.

Role properties

The following table describes the roles and associated permissions, accessible from the Roles tab in the context menu of the Security Manager:

Role Description Permissions
Analyze User Manages folders and dashboards and has access to the Analyzer screen. This role creates Dashboards with shared and personal (requires Schema Manager) schemas. This role also shares with the Share option, shares through email, or schedules Dashboards for sharing via email. Can Manage: Catalog
Can View: Schema
Dashboard Analyzer In addition to viewing and sharing the dashboards available to the user role, this role will also be able to personalize the dashboards shared with them. Can Share: Catalog
Individual Analyzer Creates new dashboards using shared or personal schemas (requires Schema Manager). This role cannot share or send dashboards via email. Can Manage: Catalog
Can View: Schema
Privileged User Shares and schedules sending dashboards via emails. Can Share: Catalog
Schema Manager Creates schemas and data sources and loads the data into the schemas. This role also shares the schemas with other users so they can create dashboards. Can Manage: Schema, Data
SuperRole Manages users, groups, and roles. Can create users and groups. This role also creates schemas and dashboards without requiring any additional roles. This is the master Admin role. Can Manage: Security, Catalog, Schema, Data
User The default roles assigned to an end-user assigned to a group. This role views any dashboard shared with them. This role can apply filters but cannot change the underlying metadata. Can View: Catalog
User Manager Creates and manages groups and users. Creates groups and adds roles. Adds users to groups. Can Manage: Security
Note

Note that Catalog refers to the Content tab in the Navigation bar.

User Manager role improvements

Starting with the 5.1.2 release, a user that belongs to a group with the User Manager role or other roles other than the SuperRole can no longer manage the assignment of the SuperRole. Now, only a SuperUser or a user that belongs to a group with the SuperRole can manage the assignment of the SuperRole and perform the following actions:

  • Assign the SuperRole to a group
  • Add a user to a group with the SuperRole
  • Roll back or unassign the SuperRole from a group
  • Remove a user from a group with the SuperRole
  • Delete a user that belongs to a group with the SuperRole
  • Delete a group with the SuperRole
Note

The new implementation will not roll back the SuperRole assignment for existing users or groups to which a User Manager assigned the SuperRole.

Group Management

As a user with security edit access, you are able to create, edit, or delete groups. You assign a group one or more roles from the Edit Group drawer. In addition, you are able to add users to a group through the Edit Group drawer.

Group Properties

The following are the group properties found in the Groups tab of the Security Manager:

Properties Description
Name The group name
Description Optional group description
Add User(s) Visible by hovering over the desired group. Open the Add User(s) to Group(s) window.
Delete Visible by hovering over the desired group. Delete the selected group.
Add Role(s) Visible by hovering over the desired group. Open the Add Role(s) to Group(s) window.

Create a Group

The following are the steps to a create a group:

  • In the Navigation bar, select Security.
  • In the Action bar, select + New.
  • From the drop down menu, select Add Group.
  • In the Add Group dialog, enter a group Name.
  • Optionally, enter a group description.
  • Select Add.

Edit Group Properties

When you select a group from the Groups tab, the Edit Group drawer will open. The Edit Group drawer is split into three sections.

Edit Group Info properties

The following are the properties of the Edit Group drawer Info section:

Property Description
Name The group name
Description Optional group description

Edit Group Users properties

From the Users section of the Edit Group drawer, you are able to view the user name and email of users in the group. You can easily search for users within the group using the search bar.

The following are the properties of users in the Users section of the Edit Group drawer:

Property Description
Name The user name
Email The users email

Add users to a group

From the Groups tab or the Edit Group drawer, you can access the Add User(s) to Group(s) window. Using this window, you can add one or more users to a group. From the Edit Group drawer, access the Add User(s) to Group(s) window in the Users section and select the Add User(s) icon (+ icon).

The Add User(s) to Group(s) window will only display users not currently in the group. You can search users using the search bar at the top of the window. Usernames and emails will be displayed in the window.

The following are the steps to access the Add User(s) to Group(s) window and add one or more users to a group:

  • In the Navigation bar, select Security.
  • In the Context bar, select Groups.
  • Hover over the desired group, select Add User(s) (people icon).

    • Optionally, you can select the desired group to open the Edit Group drawer.

      • Select Users.
      • Select Add User(s) (+ icon).
    • You may use the checkboxes in the Groups tab to select multiple groups before selecting Add Users(s) (people icon). This will allow you to add users to multiple groups at once.
  • Select one or more users from the list. You may use the search bar to filter the list.
  • Select Add.

Remove a user from a group

The following are the steps to remove one or more users from a group:

  • In the Navigation bar, select Security.
  • In the Context bar, select Groups.
  • Select the desired group.
  • In the Edit Group drawer, select Users.
  • Select one or more users.
  • Select Remove (trash icon).

Edit Group Roles properties

The following are the role properties in the Roles section of the Edit Group drawer:

Property Description
Role The role name
Permissions The granted permissions of the role.

Add roles to a group

The following are the steps to add roles to a group:

  • In the Navigation bar, select Security.
  • In the Context bar, select Groups.
  • Select the desired group.
  • In the Edit Group drawer, select Roles.
  • Select Add Role(s) (+ icon).
  • From the Add Role(s) to Group(s) drawer, select the desired roles for the group.
  • Select Add.
Note

Optionally, you can select more than one group from the Groups tab. After selecting groups, select Add Role(s) from More Options (kebab icon). This will open the Add Role(s) to Group(s) window.

Remove roles from a group

The following are the steps to remove roles from a group:

  • In the Navigation bar, select Security.
  • In the Context bar, select Groups.
  • Select the desired group.
  • In the Edit Group drawer, select Roles.
  • Select one or more roles from the drawer.
  • Select delete (trash icon).

Group API Key Enablement

Only a SuperUser can manage API Key access for groups and users. You can enable or disable API Key Generation, for the Incorta Public API, for one or more groups from the Groups tab. Users will still need to generate their individual API key once access has been granted.

The following are the steps to enable or disable API Key generation for groups:

  • In the Navigation bar, select Security.
  • In the Action bar, select Groups.
  • Select one or more groups.
  • From the Groups tab, select More Options(kebab icon).
  • Select Enable API Key Generation or Disable API Generation.
Recommendation

If you disable API key generation for all users in a group, the active API keys for those group users become immediately invalidated. For this reason, managing an API key by group is not recommended. Rather, a specific user should be associated with an API key.

Delete a group

The following are the steps to delete a group:

  • In the Navigation bar, select Security.
  • In the Context bar, select Groups.
  • Select the desired group(s).
  • Select delete (trash icon).
Warning

When you delete a group, the group and all role permissions for that group are removed from all users that were in the deleted group.

User Management

User properties

The following are the properties of a user in the Users tab of the Security Manager:

Property Description
Name The user display name.
Email The user email.
Authentication Type The Authentication type for this user. Authentication types are controlled in tenant Security of the Cluster Management Console (CMC).
Last Signed In The last time the user signed in.

Edit User properties

You can access the detailed properties of an individual user by selecting them from the Users tab.

User general properties

The following are the user properties in the General section of the Edit User drawer:

Property Control Description
Login Name immutable The user login name.
Profile Image file selection Upload an image to use as the user profile image. The file type must be a JPEG or PNG, and the file size is limited to 2MB.
Display Name text box Enter the user’s display name.
Email text box Enter the user email.
Language drop down menu Select the user’s language. Available options are:
Arabic, Chinese(Simplified), Dutch, English, French, German, Italian, Spanish, and Spanish.
Region Format drop down menu Select the user’s GMT based time zone.
Time Zone drop down menu Select the user’s GMT based time zone.
Calendar drop down menu Select the calendar format for the user.

User group membership properties

The following are the user properties in the Group Membership section of the Edit User drawer:

Property Description
Name The group name
Description The description of the group

User security properties

The following are the user properties in the Group Membership section of the Edit User drawer:

Property Control Description
Enable API Key Generation toggle Only visible as a SuperUser. Toggle API key generation for the selected user.
Current Password text box Only available in the drawer of the logged in user. Enter the current user password.
Password text box Only available in the drawer of the logged in user. Enter a new password.
Confirm Password text box Only available in the drawer of the logged in user. Confirm new password.
Reset Password button Only available to users with Security management privileges. An email will be sent to the user with a link to reset their password.
Login As button Only available to a SuperUser. Temporarily log into Incorta as the selected user. For additional information, see Additional Considerations.
Delete User button Delete the selected user.
Generate/Renew API Key button Only visible to a user that has API key generation enabled. Generate a new API key.
Copy Key button Only visible to a user that has API key generation enabled. Copy the current API key to the clipboard.

User Appearance properties

The appearance properties section is only visible to the currently logged in user.

The following are the user properties in the Appearance section of the Edit User drawer:

Property Control Description
Dark Theme toggle Enable Incorta dark mode for the selected user.
Reduce Motion toggle Enable a visually reduced motion for Interaction with chart legends.

Create a new user

The following are the steps to create new user:

  • In the Navigation bar, select Security.
  • In the Context bar, select + New.
  • Select Add User.
  • Enter the desired user properties.
  • Select Add.

Add a group to a user’s group membership

The following are the steps to add a group to a user’s group membership:

  • In the Navigation bar, select Security.
  • In the Context bar, select Users.
  • Select the desired user.
  • Optionally, you can select multiple users and select the Add to Group(s) (people icon).
  • In the Edit User drawer, select the Group Membership section.
  • Select the Add to Group(s) (+ icon).
  • Select the desired groups to add the user to.
  • Select Add.

Remove a group from a user’s group membership

The following are the steps to remove a group from a user’s group membership:

  • In the Navigation bar, select Security.
  • In the Context bar, select Users.
  • Select the desired user.
  • In the Edit User drawer, select the Group Membership section.
  • Select the desired groups to remove from the user.
  • Select delete (trash icon).

Import and synchronize users and groups

Incorta offers two different methods to insert new users and groups, update their details, or update the user-group assignment without the need to add or edit them one by one or to use a command-line interface (CLI). Those two methods are to:

  • Import and synchronize Incorta users and groups with a physical schema in Incorta
  • Import and synchronize Incorta users and groups with domain users and groups using LDAP

As a CMC administrator or a Super User, you can access the Security Manager and synchronize users, groups, and their assignments in a domain or an Incorta physical schema. Users and groups you need to synchronize must fulfill the naming convention and other rules (such as the name length) that apply to users and groups in Incorta; otherwise, they will not be synchronized.

Note

By design, the synchronization process continues on failure or error. Thus, if an item (user, group, or relation) fails to synchronize, the process will continue to synchronize other items, if any.

Import and synchronize Incorta users and groups with an Incorta physical schema

Starting with the 5.0.2 release, you can synchronize Incorta users and groups with users and groups that are stored in an Incorta physical schema in the same tenant using the Security Manager.

You can create a .properties configuration file that maps the columns in the physical schema objects to user and group details in the Incorta metadata database. You can also download a template of this file to help you provide the required information. Then, you can upload this file to Incorta and have users, groups, and relations imported to or updated in the metadata database.

Incorta physical schema prerequisites

The physical schema that you can use to synchronize users and groups must have the required details of the users, groups, and their relations or assignments (users’ group membership).

Note

These user and group details can exist in one or more physical schemas, and in one or more objects.

The physical schema(s) must have the following minimal information:

Object Information Comments
Users Login Name Required
Unique
Email Required
Unique
Display Name Required
Groups Group Name Required
Description Optional

Incorta supports two different modes to define the user-group relations: groups mode and roles mode. Users and groups can have direct relation (groups assignment mode), or they can be related using a common property or attribute, such as the department, location, or job (roles assignment mode). As a result, the assignment details can exist in the physical schema as follows:

  • A single physical schema object that contains users and their assigned groups
  • Two physical schema objects; one to define the relation between users and the common attribute and the other to define the relationship between the group and the common attribute.
Important

The .properties file refers to the common attribute as role. Do not mix this up with Incorta Roles.

Note

The relation between users and groups is many-to-many. A group can have multiple users and a user can be a member in multiple groups. Thus, the same user or group can have multiple records or rows in the assignment table(s).

The following table shows the information that must be available in the physical schema in the case of using the groups assignment mode (users and groups are directly related):

Object Information Comments
User-group assignment User Required
Group Required
Operation Optional
A value that you want to check to either skip a record or to include it in the synchronization process

The following table shows the required information in the case of using the roles assignment mode (users and groups are connected through a common attribute):

Object Information Comments
User-property assignment User Required
Attribute Required
Operation Optional
A value that you want to check to either skip a record or to include it in the synchronization process
Group-property assignment Group Required
Attribute Required
Operation Optional
A value that you want to check to either skip a record or to include it in the synchronization process
Preparing the properties file

You must have a .properties file that maps the physical schema object columns to Incorta user and group details. You can either create the file from scratch or download a template file and update it. You must enter the column fully qualified name in the following format: physical_schema.object.column, for example, securityInfo.users.email.

Here are the steps to download and update the template file:

  • Sign in to the Incorta Direct Data Platform™ as an Incorta Super User or CMC administrator.
  • In the Navigation bar, select Security.
  • In the Context bar, select + NewUser Sync.
  • In the Sync users via a properties file dialog, on the via Incorta Schema tab, select Download a template properties file.
  • Update the file with the required information and then save it.

The following table shows the contents of the .properties file for the users and groups:

Property Required Description
user.login Yes Enter the fully qualified name of the column that maps to the user login name
user.email Yes Enter the fully qualified name of the column that maps to the user’s email
user.name Yes Enter the fully qualified name of the column that maps to the user’s display name
user.lang Yes Enter the fully qualified name of the column that maps to the user language, or enter it in the following format: "Language"
The default is English.
user.country Yes Enter the fully qualified name of the column that maps to the user’s country, or enter it in the following format: "Country"
The default is US.
user.timezone Yes Enter the fully qualified name of the column that maps to the user’s timezone, or enter it in the following format: "TimeZone"
The default is GMT-08:00.
user.calendar Yes Enter the fully qualified name of the column that maps to the user’s calendar, or enter it in the following format: "Calendar"
The default is Gregorian.
user.type Yes Enter the fully qualified name of the column that maps to the user authentication type, or enter it in the following format: "Type".
Valid options are:
  • SSO
  • Internal
  • LDAP
  • Azure_AD
  • group.name Yes Enter the fully qualified name of the column that maps to the group name
    group.description Yes Enter the fully qualified name of the column that maps to the group description
    group.type Yes Enter the fully qualified name of the column that maps to the group type, or enter it in the following format: "Type".
    Valid options are:
  • SSO
  • Internal
  • LDAP
  • Azure_AD
  • The following table shows the contents of the .properties file that you must provide in the case of using the groups assignment mode:

    Property Required Description
    user-group.group Yes Enter the fully qualified name of the column that maps to the group name or the group’s unique identifier in the user-group assignment table
    user-group.user Yes Enter the fully qualified name of the column that maps to the user name or the user’s unique identifier in the user-group assignment table
    user-group.operation No Enter the fully qualified name of the column that maps to the operation column in the user-group assignment table
    user-group.deleteOperation No Enter a value that you want to check against the Operation column in the user-group assignment table. Rows or records with a matched value will be skipped during the synchronization process.

    The following table shows the contents of the .properties file that you must define in the case of using the roles assignment mode:

    Property Required Description
    function-roles.function Yes Enter the fully qualified name of the column that maps to the group name or the group’s unique identifier in the group-role assignment table
    function-roles.role Yes Enter the fully qualified name of the column that maps to the role name or the role’s unique identifier in the group-role assignment table
    function-roles.operation No Enter the fully qualified name of the column that maps to the Operation column in the group-role assignment table
    function-roles.deleteOperation No Enter a value that you want to check against the Operation column in the group-role assignment table. Rows or records with a matched value will be skipped during the synchronization process.
    user-roles.user Yes Enter the fully qualified name of the column that maps to the user name or the user’s unique identifier in the user-role assignment table
    user-roles.role Yes Enter the fully qualified name of the column that maps to the role name or the role’s unique identifier in the user-role assignment table
    user-roles.operation No Enter the fully qualified name of the column that maps to the Operation column in the user-role assignment table
    user-roles.deleteOperation No Enter a value that you want to check against the Operation column in the user-role assignment table. Rows or records with a matched value will be skipped during the synchronization process.

    The following table shows the contents of the .properties file related to the global configurations:

    Property Required Description
    autoGenerateGroup Yes Enter true or false. When set to true, all groups that exist in the physical schema object are added, as appropriate. When set to false, the groups section in the .properties file is skipped, so no groups will be added.
    fullsync Yes Enter true or false. When set to true, it removes all assignments related to each group in the physical schema before adding the group’s new assignments. When set to false, it adds the new assignments while keeping existing ones.
    assignmentMode Yes Define the assignment mode: groups or roles
    Import and synchronize Incorta users and groups with an Incorta physical schema

    Here are the steps to import and synchronize Incorta users and groups with users and groups in a physical schema using the .properties file that you have prepared:

    • Sign in to the Incorta Direct Data Platform™ as an Incorta Super User or CMC administrator.
    • In the Navigation bar, select Security.
    • In the Context bar, select + NewUser Sync.
    • In the Sync users via a properties file dialog, on the via Incorta Schema tab, select Upload file, and then select the .properties file you have prepared.

      • If you want to select another file, select Delete (trash can icon) next to the selected file name, and then select Upload file again to select the file you want.
    • Select Execute.
    Note

    If the file you provide does not have all the required information, an error message appears after executing the synchronization process denoting the missing or wrong information.

    Review the synchronization report

    In the case of a successful synchronization process, only a message will denote that the synchronization is successful. However, if the synchronization partially fails, the confirmation message will show the number of synchronized items and the number of failed ones. There will be a link to show the details of failed items. Select the link and review the list of failed items with the related error. You can copy the details of failed items to the Clipboard to save them.

    Import and synchronize Incorta users and groups with domain users and groups

    With the introduction of the 5.1.2 release, the Security Manager allows you to import and synchronize domain users and groups with Incorta using the LDAP protocol. As a CMC administrator or a Super User, you can access the Security Manager and synchronize domain users, groups, and their assignments without the need to use a CLI tool.

    You can create a .properties configuration file that maps the LDAP attributes to user and group details in the Incorta metadata database. You can also download a template of this file to help you provide the required information. Then, you can upload this file to Incorta and have users and groups imported to or updated in the metadata database.

    There is a report that shows the status of the synchronization process, whether succeeded or failed. You can view a detailed report and download it as well. For successful completion, you will have a list of newly added and updated items. In the case that there are failed items, the status report shows them as well.

    As a result of a successful synchronization process, both the SYNC_DIRECTORY_RESULT and SYNC_DIRECTORY_ITEMS tables in the metadata database will be updated.

    • A new record will be available in the SYNC_DIRECTORY_RESULT table with the details of the latest run.
    • The SYNC_DIRECTORY_ITEMS will have new records for the new, updated, and failed items, whether users, groups, or assignments (relations). Each record will have the ID of the run to allow tracking. In the case of failed items, the reason will be available.
    Prepare for the LDAP synchronization

    You need to have a .properties file that maps the LDAP attributes to Incorta user and group details. You can either create the file from scratch or download a template file and update it.

    Here are the steps to download and update the template file:

    • Sign in to the Incorta Direct Data Platform™ as an Incorta Super User or CMC administrator.
    • In the Navigation bar, select Security.
    • In the Context bar, select + NewUser Sync.
    • In the Sync users via a properties file dialog, select the via LDAP Directory tab.
    • Select Download a template LDAP configuration file to download a template of the .properties file.
    • Update the file with the required information and then save it.

    The following table shows the contents of the .properties file:

    Property Required Description
    ldap.base.provider.url Yes The LDAP server URL, for example, ldap://ldap.mycompany.com
    ldap.base.dn Yes The base domain name (Base DN) that is the root where the LDAP protocol will start searching for users in the directory service, for example, dc=ldap,dc=company,dc=com
    ldap.user.dn Yes The username of a user that has access to the LDAP server to fetch user data from it
    ldap.user.dn.password Yes The password of the user to authenticate to the LDAP server
    ldap.user.mapping.login No The attribute in the LDAP server user object that maps to the user’s login name in Incorta
    ldap.user.mapping.name No The attribute in the LDAP server user object that maps to the user’s name in Incorta
    ldap.user.mapping.mail No The attribute in the LDAP server user object that maps to the user’s email address in Incorta
    ldap.group.mapping.name No The attribute in the LDAP server group object that maps to the group name in Incorta
    ldap.group.mapping.member No The attribute in the LDAP server group object that maps to the list of users that exist in the group
    ldap.user.search.filter No An LDAP query to filter users
    ldap.group.search.filter No An LDAP query to filter groups
    user.type No The user authentication type. Possible values are the following:
  • Internal (authentication by Incorta)
  • sso
  • ldap
    The default value is ldap.
    Note that this must match the Authentication Type in the Tenant Configurations to allow authenticating the user when signing in.
  • ldap.follow.referral No If you have your entire directory on one domain controller, set this property to false, which is the default value.
    If your domain has a partitioned directory that is distributed among multiple domain controllers, you can set this option to true to indicate that the contacted domain controller (LDAP server) may not have the user and group objects you need. In such a case, the contacted domain controller will reply with another location (LDAP server URL) that is likely to have these objects, which is a process that may result in slower LDAP queries.
    Import and synchronize Incorta users and groups with LDAP domain users and groups

    Here are the steps to import and synchronize Incorta users and groups with domain users and groups using the .properties file that you have prepared:

    • Sign in to the Incorta Direct Data Platform™ as an Incorta Super User or CMC administrator.
    • In the Navigation bar, select Security.
    • In the Context bar, select + NewUser Sync.
    • In the Sync users via a properties file dialog, select the via LDAP Directory tab.
    • Select Upload file, and then select the .properties file you have prepared.

      • If you want to select another file, select Delete (trash can icon) next to the selected file name, and then select Upload file again to select the file you want.
    • Select Execute.
    Note

    If the file you provide does not have all the required information, an error message appears when you upload the file denoting the missing or wrong information.

    Review and download the synchronization report
    • After uploading the file and starting the synchronization, a message appears denoting the synchronization process. When the process is completed, the message shows the result.
    • In the message, select See details.
    • In the dialog, review the synchronization result.

      • For successful synchronization, a list of synchronized items is displayed.
      • For synchronization with errors, a list of these errors is displayed.
    • To download the report in a .csv file format, select Download Sync Status Report.

    The LDAP Sync Report shows all synchronized items, their type (user, group, or relation), their import status (created, updated, or failed), and the error in the case of failed items.

    User API Key Enablement

    Only a SuperUser can manage API Key access for groups and users. You can enable or disable API Key Generation, for the Incorta Public API, for one or more users from the Users tab. Users will still need to generate their individual API key once access has been granted.

    The following are the steps to enable or disable API Key generation for users:

    • As an Incorta Super User, sign into the Incorta Direct Data Platform™.
    • In the Navigation bar, select Security.
    • In the Action bar, select Users.
    • Select the checkbox next to each user for which you would like to enable/disable API key generation.
    • From the more options menu (kebab icon), select Enable/Disable API Key Generation.

    Delete a user

    When you delete a user, Incorta will inform you of what content they have created and have ownership of. The content must either be deleted or ownership transferred to another user. You can not delete more than one user at a time and a user cannot delete their own account.

    The following are the steps to delete a user:

    • In the Navigation bar, select Security.
    • In the Context bar, select Users.
    • Select the desired user.
    • Select delete (trash icon).
    • In Check:

      • Incorta will inform you if the selected user owns content.
      • If the user owns no content:

        • You can select Next and proceed to Confirm.
      • If the user owns content:

        • Incorta will list the quantity of each type of entity the user owns.
        • You must select one of the following options:

          • Delete the entities owned by the user.
          • Or, transfer ownership to the current/another user.
    • In Transfer:

      • Select if sharing permissions, sharing access rights, are transferred to the new owner.
      • Select to transfer to the current user or another user.
      • When you select Next, the ownership transfer is completed immediately.
    • In Confirm:

      • Select Delete.

    Additional Considerations

    Login As feature

    A user that inherits the SuperRole has the ability to impersonate a user. The SuperUser is able to use the Login As feature to impersonate another Incorta user. You can access the feature from the Edit User drawer. Once active, you will be restricted to the same permission and shared access as the impersonated user. Any changes you make to the user’s content or user settings will be reflected in the user’s account. To return to your SuperUser account, select Switch Back from the profile menu in the top right corner of the Action bar.

    An impersonated user receives an email notifying them of their impersonation. However, this requires SMTP configuration for the Incorta Cluster.

    To limit the possibility of unwanted user impersonation, Incorta strongly encourages that security administrators limit the number of users that inherit the SuperRole as well as configure SMTP for the Incorta Cluster.

    To learn more about SMTP configuration, please review Email Configuration.


    © Incorta, Inc. All Rights Reserved.