SlideShare a Scribd company logo
Actonic GDPR Tools
for Confluence
Here are the articles in this section:
 Getting started
 Data Level Agreement
 Access Statistics
 View Permissions
 Permission Monitoring
 Information Announcing
 Profile Visibility
Getting started
 Installation
Go into Atlassian Marketplace and install the app "Actonic GDPR Tools
for Jira". Use for the installation the Universal Plugin Manager from
Atlassian. There are different ways to install apps.
 Configuration Overview
Navigate to Jira Administration → Add-ons
 On the left side navigation menu
you will find ACTONIC GDPR Tools
• ​Information Announcing​
• Permission Monitoring​
• ​View Permissions​
• ​Access Statistics​
• ​Data Level Agreement
Data Level Agreement
 Overview
This is a very powerful tool to automate the deletion process.
• Use CQL to define issues which will be processed
• Each rule may be applied only for particular CQL result set.
• Time execution interval will be a Cron expression
• Action" will be a one of possible options: Send Notification, Add
comment to the Page, Delete Page, Restrict access to a page.
Navigate to Permission Monitoring tab
Set some new rules
Access Statistics
 Overview
• Track and store all "Page View" events for any user (including
anonymous).
• Provide ability to filter access statistics by space or page in space
(who have accessed the page and when).
• Provide ability to filter access statistics by user (which pages user
have seen and when).
• Store statistics for some configurable period (by default 3 months);
the time period isconfigurable.
Select A Filter
You can select a filter for the results of the permission monitoring. You
can choose from User, Space, Page, Date from/to and Sorting by.
Then click on the blue button "Filter" to see the results
Filter Results
The filter results are shown in a table format. The columns are date,
space, page, user, IP adress and access type (from browser or REST
API).
The app differentiates between a browser call which was made by any
browser and REST call which was made for example by a 3rd party
application.
View Permissions
Overview
We build this to help out the Confluence administrators.
• Get all spaces, where some user has View permission
• Get all users, which can view some Space
Filter by User
Select a user, then you will see in which Spaces the user has view
permissions.
Filter by Space
Select a Space, then you will see which users have view permissions in
this specific space.
Permission Monitoring
Overview
This tool provides the ability to get all necessary permission for all
change events, for example like: user creations, user profile changes,
user added to a specific Space role, user deleted from a Space roles,
etc.
1. Navigate to Permission Monitoring tab
You can select a filter for the results of the permission monitoring. You
can choose from User, Users in Group, Space, Event type, Date from to
and Sorting by.
Then click on the blue button "Filter" to see the results
2. Select A Filter
The filter results are shown in a table format. The columns are Date,
Author of change, User or Group, Event type and some details.
Then click on the blue button "Filter" to see the results
3. Filter Results
You can reset your filters when you click on on the Clear button.
4. Clear The Results
You can reset your filters when you click on on the Clear button.
5. Export Results
Information Announcing
This feature is used to let the user accept your privacy policy.
1. Open "Information Announcing"
2. Create a new announcing
Each announcement may be "Optional" or "Required"
3. Put a new html text in it
Profile Visibility
Overview
1. This tool allows to restrict an access to user profiles, which available
by '/users/viewuserprofile.action' URL.
2. You can hide all profiles from everyone or define rules based on
groups.
1. Open Profile Visibility module
2. Set profile visibility rules, used in your company
3. Each user is able to hide the profile from everyone
For More Information Please visit
Actonic App Doc
Actonic GDPR Tools for Confluence

More Related Content

Similar to Actonic GDPR Tools for Confluence

Visão completa do ADAudit Plus
Visão completa do ADAudit PlusVisão completa do ADAudit Plus
Visão completa do ADAudit Plus
Netrunner Tecnologia
 
Monitoring of computers
Monitoring of computers Monitoring of computers
Monitoring of computers
carlosrudy_45
 
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - rep...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - rep...MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - rep...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - rep...
MAF InfoCom
 
159 200523 Google Analytics For Beginners
159 200523 Google Analytics For Beginners159 200523 Google Analytics For Beginners
159 200523 Google Analytics For Beginners
Lia s. Associates | Branding & Design
 
Remedy Presentation
Remedy PresentationRemedy Presentation
Remedy Presentation
Charrisa Coulibaly
 
Online dating system management project report.pdf
Online dating system management project report.pdfOnline dating system management project report.pdf
Online dating system management project report.pdf
Kamal Acharya
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
Lisa Dowdell, MSISTM
 
ManageEngine ADAudit Plus - Active Directory audit software.
ManageEngine ADAudit Plus - Active Directory audit software.ManageEngine ADAudit Plus - Active Directory audit software.
ManageEngine ADAudit Plus - Active Directory audit software.
Ashok Kumar
 
© 2013 Cisco andor its affiliates. All rights reserved. Thi.docx
© 2013 Cisco andor its affiliates. All rights reserved. Thi.docx© 2013 Cisco andor its affiliates. All rights reserved. Thi.docx
© 2013 Cisco andor its affiliates. All rights reserved. Thi.docx
LynellBull52
 
31-Steps Conversion & Retention Optimization Checklist.pptx
31-Steps Conversion & Retention Optimization Checklist.pptx31-Steps Conversion & Retention Optimization Checklist.pptx
31-Steps Conversion & Retention Optimization Checklist.pptx
RamanParashar3
 
Setting up Filters & Layouts in P6
Setting up Filters & Layouts in P6Setting up Filters & Layouts in P6
Setting up Filters & Layouts in P6
PMA Consultants
 
d5)Go to the following website by clicking on the provided link,
d5)Go to the following website by clicking on the provided link,d5)Go to the following website by clicking on the provided link,
d5)Go to the following website by clicking on the provided link,
OllieShoresna
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Sangeetha Rangarajan
 
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COMIT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
albert0061
 
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
vraopolisetti
 
Salesforce Winter ’23 Release Highlights
Salesforce Winter ’23 Release HighlightsSalesforce Winter ’23 Release Highlights
Salesforce Winter ’23 Release Highlights
SkyPlanner
 
Internet Explorer 8 for Admins
Internet Explorer 8 for AdminsInternet Explorer 8 for Admins
Internet Explorer 8 for Admins
Kelly Jones
 
Security checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdfSecurity checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdf
GeovaniGonalves6
 
HCI Part 6 - Prototype and Evaluation Plan
HCI Part 6 - Prototype and Evaluation PlanHCI Part 6 - Prototype and Evaluation Plan
HCI Part 6 - Prototype and Evaluation Plan
Kemar Harris
 
HCI - PROTOTYPE & EVALUATION PLAN
HCI - PROTOTYPE & EVALUATION PLANHCI - PROTOTYPE & EVALUATION PLAN
HCI - PROTOTYPE & EVALUATION PLAN
Kemar Harris
 

Similar to Actonic GDPR Tools for Confluence (20)

Visão completa do ADAudit Plus
Visão completa do ADAudit PlusVisão completa do ADAudit Plus
Visão completa do ADAudit Plus
 
Monitoring of computers
Monitoring of computers Monitoring of computers
Monitoring of computers
 
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - rep...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - rep...MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - rep...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - rep...
 
159 200523 Google Analytics For Beginners
159 200523 Google Analytics For Beginners159 200523 Google Analytics For Beginners
159 200523 Google Analytics For Beginners
 
Remedy Presentation
Remedy PresentationRemedy Presentation
Remedy Presentation
 
Online dating system management project report.pdf
Online dating system management project report.pdfOnline dating system management project report.pdf
Online dating system management project report.pdf
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
 
ManageEngine ADAudit Plus - Active Directory audit software.
ManageEngine ADAudit Plus - Active Directory audit software.ManageEngine ADAudit Plus - Active Directory audit software.
ManageEngine ADAudit Plus - Active Directory audit software.
 
© 2013 Cisco andor its affiliates. All rights reserved. Thi.docx
© 2013 Cisco andor its affiliates. All rights reserved. Thi.docx© 2013 Cisco andor its affiliates. All rights reserved. Thi.docx
© 2013 Cisco andor its affiliates. All rights reserved. Thi.docx
 
31-Steps Conversion & Retention Optimization Checklist.pptx
31-Steps Conversion & Retention Optimization Checklist.pptx31-Steps Conversion & Retention Optimization Checklist.pptx
31-Steps Conversion & Retention Optimization Checklist.pptx
 
Setting up Filters & Layouts in P6
Setting up Filters & Layouts in P6Setting up Filters & Layouts in P6
Setting up Filters & Layouts in P6
 
d5)Go to the following website by clicking on the provided link,
d5)Go to the following website by clicking on the provided link,d5)Go to the following website by clicking on the provided link,
d5)Go to the following website by clicking on the provided link,
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COMIT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
IT 145 FINAL PROJECT GUIDELINES / TUTORIALOUTLET DOT COM
 
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
 
Salesforce Winter ’23 Release Highlights
Salesforce Winter ’23 Release HighlightsSalesforce Winter ’23 Release Highlights
Salesforce Winter ’23 Release Highlights
 
Internet Explorer 8 for Admins
Internet Explorer 8 for AdminsInternet Explorer 8 for Admins
Internet Explorer 8 for Admins
 
Security checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdfSecurity checklist - Google Workspace.pdf
Security checklist - Google Workspace.pdf
 
HCI Part 6 - Prototype and Evaluation Plan
HCI Part 6 - Prototype and Evaluation PlanHCI Part 6 - Prototype and Evaluation Plan
HCI Part 6 - Prototype and Evaluation Plan
 
HCI - PROTOTYPE & EVALUATION PLAN
HCI - PROTOTYPE & EVALUATION PLANHCI - PROTOTYPE & EVALUATION PLAN
HCI - PROTOTYPE & EVALUATION PLAN
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Actonic GDPR Tools for Confluence

  • 2. Here are the articles in this section:  Getting started  Data Level Agreement  Access Statistics  View Permissions  Permission Monitoring  Information Announcing  Profile Visibility
  • 3. Getting started  Installation Go into Atlassian Marketplace and install the app "Actonic GDPR Tools for Jira". Use for the installation the Universal Plugin Manager from Atlassian. There are different ways to install apps.  Configuration Overview Navigate to Jira Administration → Add-ons  On the left side navigation menu you will find ACTONIC GDPR Tools • ​Information Announcing​ • Permission Monitoring​ • ​View Permissions​ • ​Access Statistics​ • ​Data Level Agreement
  • 4. Data Level Agreement  Overview This is a very powerful tool to automate the deletion process. • Use CQL to define issues which will be processed • Each rule may be applied only for particular CQL result set. • Time execution interval will be a Cron expression • Action" will be a one of possible options: Send Notification, Add comment to the Page, Delete Page, Restrict access to a page. Navigate to Permission Monitoring tab
  • 5. Set some new rules
  • 6. Access Statistics  Overview • Track and store all "Page View" events for any user (including anonymous). • Provide ability to filter access statistics by space or page in space (who have accessed the page and when). • Provide ability to filter access statistics by user (which pages user have seen and when). • Store statistics for some configurable period (by default 3 months); the time period isconfigurable.
  • 7. Select A Filter You can select a filter for the results of the permission monitoring. You can choose from User, Space, Page, Date from/to and Sorting by. Then click on the blue button "Filter" to see the results
  • 8. Filter Results The filter results are shown in a table format. The columns are date, space, page, user, IP adress and access type (from browser or REST API). The app differentiates between a browser call which was made by any browser and REST call which was made for example by a 3rd party application.
  • 9. View Permissions Overview We build this to help out the Confluence administrators. • Get all spaces, where some user has View permission • Get all users, which can view some Space
  • 10. Filter by User Select a user, then you will see in which Spaces the user has view permissions.
  • 11. Filter by Space Select a Space, then you will see which users have view permissions in this specific space.
  • 12. Permission Monitoring Overview This tool provides the ability to get all necessary permission for all change events, for example like: user creations, user profile changes, user added to a specific Space role, user deleted from a Space roles, etc. 1. Navigate to Permission Monitoring tab
  • 13. You can select a filter for the results of the permission monitoring. You can choose from User, Users in Group, Space, Event type, Date from to and Sorting by. Then click on the blue button "Filter" to see the results 2. Select A Filter
  • 14. The filter results are shown in a table format. The columns are Date, Author of change, User or Group, Event type and some details. Then click on the blue button "Filter" to see the results 3. Filter Results
  • 15. You can reset your filters when you click on on the Clear button. 4. Clear The Results
  • 16. You can reset your filters when you click on on the Clear button. 5. Export Results
  • 17. Information Announcing This feature is used to let the user accept your privacy policy. 1. Open "Information Announcing"
  • 18. 2. Create a new announcing
  • 19. Each announcement may be "Optional" or "Required" 3. Put a new html text in it
  • 20. Profile Visibility Overview 1. This tool allows to restrict an access to user profiles, which available by '/users/viewuserprofile.action' URL. 2. You can hide all profiles from everyone or define rules based on groups. 1. Open Profile Visibility module
  • 21. 2. Set profile visibility rules, used in your company
  • 22. 3. Each user is able to hide the profile from everyone
  • 23. For More Information Please visit Actonic App Doc