Can't find what you are looking for? Try these pages!

Security

Security

Strict and detailed user, group, profile and password policies give administrators extensive control over who can access what and, more importantly, who cannot – down to the source data row and column level. Design rights are also very granular to control precisely if, and to what extent users can modify or create reports for themselves or for sharing with others. Network encryption can be forced on globally or for ranges of IP addresses and custom certificates that associate users with a named organization can be implemented. Read about other audit features below.