Application Implementation Consultant is a powerful role that has unrestricted access to a large amount of data. After the implementation is complete, we have to revoke this role from all users.
Path Implementation Users > Revoke Data Role.
What Are System User Names?
For example, a person's party number, person number, or email might not be available when the user account is requested. In such cases, a system user name is generated by applying these options, in the order they're listed, until a unique user name is obtained.
- If only the last name is available, a random character is prefixed to the last name.
What is location based access?
You can use location based access to control user access to tasks and data based on their roles and computer IP addresses.
How to enable location based access?
Enable Location-Based Access
Path Navigator > Security Console.
On the Administration page, click the Location Based Access tab.
Select Enable Location Based Access.
In the IP Address Whitelist text box, enter one or more IP addresses separated by commas. For example, 192.168.10.12, 192.168.10.0. To indicate a range of IP addresses, you may follow the Classless Inter-Domain Routing (CIDR) notation, such as 192.168.10.0/24.
Note: You can enter the IP address (IPv4 only) range suffix only up to 32 in the IP Address Whitelist text box. For example, 188.8.131.52/32 to 184.108.40.206/32.
Tip: Your computer's IP address appears on the page. Add that IP address to the list so that your access to the application remains unaffected when you sign in from that computer.
Review the confirmation message and click OK.