Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Current »

There are 3 types of security you can apply to a user field to control access.

Security TypeDescription
ViewUser can view the user field on the form, but the field is read only.
EditUser can enter information in the user field.
AdminUser can add and remove options in the field from within the form (Only applies to Select, Cascading, Radio and Check Box fields).

1. Select the User field.

2. Click the Security Tab.

3. Using the Contact picker add users, companies or roles in the relevant security type.

4. Click Update.

Use the keyword AUTHOR in security

We added support for using AUTHOR as a keyword in security in these areas.

  • See/Edit/Administer a user field

  • Status Allocation

  • Status Action button visibility

  • May edit title/May edit due date

  • Closers and Status Changers

  • Status Approvers (For Approval)

  • May reopen a closed document

  • Split

  • Handover report

You may also use -[Author] as a security setting for exclusions. i.e. everyone but the Author can do the edit.

For security checking, iTWO cx will process rules in an order of most specific to least specific, and minus with a higher priority than plus rules.

Meaning you could configure a scenario such as +RIB-*, -RIB-JD, which would mean everyone in RIB except John Doe.

This means regardless of the order a user enters in the UI, iTWO cx will process security in the following order:

  1. -[Author]

  2. +[Author]

  3. -User

  4. +User

  5. -User Role (Group without Allow Multiple)

  6. +User Role (Group without Allow Multiple)

  7. -Company

  8. +Company

  9. -Group

  10. +Group

  11. -Role

  12. +Role

  13. -Distribution List

  14. +Distribution List

  15. -All

  16. +All



  • No labels