ipMonitor 8's enhanced Configurable Reports allow you to provide specific ipMonitor Accounts with limited access to custom Reports.
For example, you may choose to allow certain staff members in various departments within your corporation to view statistics for monitored resources that pertain only to them. Or you may be monitoring web sites for a number of clients, who would only require access to their own set of data.
There are a number of advantages to this setup:
This tutorial illustrates the configuration setup required to provide specific Accounts with access to customized Reports.
|Click the PDF icon to open a printable PDF version of this tutorial. It includes all the information found here, including images from the ipMonitor software, diagrams, and links to additional resources.|
To create a Configurable Report, proceed with the following:
Limit your choices to those Monitors directly relevant to a specific end user. For the purposes of this tutorial, we will assume that the Account in question is set up to be used by the Information Systems branch at a Server Storage Center (the SSC Group shown below).
For additional information on customizing a Report Template, refer to the Configurable Reports section of the Administrator's Guide.
Once the Configurable Report has been created, you can then restrict access to it.
Note: ipMonitor Administrator Accounts have access to all Reports. Access restrictions can only be applied to User and Guest Accounts.
The Access Restriction section is located at the bottom of the Edit Report screen. You'll be automatically directed to this screen after creating the Report Template using the Add Report Wizard.
ipMonitor 8's highly enhanced Configurable Reports allow you to add HTML fragments to further customize the resulting Report.
Adding a "Meta Refresh" HTML tag to the Report allows you to include automatic refresh capabilities within the Report. This makes it possible for the end-user to have access to the most recent data without having to re-launch the Report or refresh the page manually.
At this point, the Report is ready to be accessed by the User Account specified in Step 2 of this tutorial. Before proceeding, however, we recommend ensuring that the Account in question has been granted limited permissions. To verify this, proceed with the following:
For additional information regarding setting access restrictions on a per-Account basis, refer to the tutorial titled Accounts: Configure User Accounts Permission Levels.
The User Account can now log in to ipMonitor. Using the access restrictions depicted above, no other information will be visible when the end-user logs in to the software.
For information on other features and concepts related to those discussed in this article, refer to the following ipMonitor resources:
Last Updated: October 6, 2006 | What did you think of this topic?