Start a conversation

G2 Analytics - Security Settings

 

G2 Analytics- Adding users

 

             

 

Contents

  1. Introduction.................................................................................................................... 3

1.1.  Goals of this document............................................................................................. 3

1.1.  Set the security settings for folders........................................................................... 3

 

 

             

1. Introduction

        1.1.         Goals of this document

This document is created to provide instructions to add users to G2 Analytics reports and give them access rights. This document is an addition to the installation manual 

 

                           1.1.      Set the security settings for folders

 

The addition of users to access the reports can be done by adding the user names in the site settings. 

 

 

 

 

Navigate to the Security settings within the site settings

 

 

 

 

It is then possible to add a new user by clicking the New System Role Assignment. You can then enter the username along with the domain name and choose them to be a system administrator or a system user. 

 

 

 

 

Now, the user that has been added to the system will be displayed in Security under Site settings. 

 

 

 

 

Test the user logins by adding yourself as a test user and check if the credentials are authenticated and you are able to access the reporting website. 

 

It is possible to set the security per folder. Click each folder and do the following.

 

 

 

Select “Folder Settings”.

 

 

 

Click on “Security”.

 

 

 

Now click on “Edit Item Security” and press “OK”.

 

The message that appears will ask if you'd like to deviate from inheriting item security parent folder, choose “ok” if this is necessary and then choose “New Role Assignment” and associate the user or group with the roles for this folder. This way you can set the rights per folder.

 

OPTIONAL: There are more ways of how to configure the authentication types. In case of windows authentication, make sure Windows User Account Control (UAC) restrictions have been addressed and the user is added to access the reporting services. .

 

 

Security_settings.pdf

  1. 508 KB
  2. View
  3. Download
Choose files or drag and drop files
Was this article helpful?
Yes
No
  1. Rob Olijve

  2. Posted
  3. Updated

Comments