WIAM® ICE can adopt these authorisation procedures automatically as part of a connection with Single Sign On, Windows Kerberos and the like. Alternatively, separate solutions can be created regardless of any existing user management. Whatever the chosen option, the user privileges can be restricted by setting filters on different hierarchies and on datasheet views. And even if a user is allowed to see some restricted part of data, this does not mean the data can be edited by this user. Accordingly, in an application diverse user concepts are conceivable, which govern not only visibility but also read and write access.
On the one hand, the connection to an existing user concept prevents the proliferation of user rights, roles and possibly conflicting permissions in different systems and therefore, leads to uniformity in the company. On the other hand, the independent development of an autonomous users’ role and database in WIAM® ICE supports the necessary flexibility and adaptability to changing usage situations, data manipulation and management processes. Both versions have their respective advantages and disadvantages and are successful, depending on the corporate philosophy. WIAM® can consult on the various options of access and user management depending on the company’s requirements.