🔑 This is a Key Topic, with high value for all users.
Only users configured as IMOS Security Administrators can perform the actions described in this article.
IMOS Security is designed to protect data and prevent unauthorized access to the IMOS environment. The Security system manages all user rights on the IMOS system. For each user and/or group, you can assign rights to perform the functions related to each module and object in IMOS.
Configuring IMOS Security
To create a secure environment, we recommend that the database connection be configured for SQL authentication. Individual users can then either be provided an IMOS login or use Windows Authentication to gain access to the system without having direct access to the database. For information on editing the imosEnv.xml file to disable Trusted_Connection and using a SQL login and password, see Installing IMOS7. Also note that for this to be secure, the application server on which the imosauth.exe service is running should not be accessible by individual non-administrative users; otherwise, they could simply look up usernames and passwords.
Setting Up Security for Individual Users and Groups
To set up IMOS Security:
In the Data Center
, under Quick Links, click
On the Security List:
Note: We recommend that you create groups and assign rights to them before you create individual users. You might find it more efficient to categorize users in groups and then adjust rights for individuals, rather than starting from scratch for each user.
Creating groups and creating users are nearly identical tasks, with nearly the same window tabs:
Group or User
Once these steps are complete, users can use their credentials on the Login page. If IMOS verifies their credentials, IMOS starts.
Reports in the Security List
When you click the Report button, you can run the following reports:
Security List Report: The same view as in Security List
User/Group Report: A report that details all of the individual permissions that were assigned to a user/group