Users
The Users screen contains an overview of all users and user-related information, such as group memberships, effective rights and session logs. To grant a user access to a Thinkwise application, the user needs to be added to the Intelligent Application Manager first.
Add users
New users can be added from the Form tab page in the Users screen.
Add a new user
General
The user ID is the login name of the user. Depending on the Authentication type, this could be the Windows domain user, database user, Kerberos user or an identifying name.
The Visitor field can be checked to indicate whether a user is an external visitor of the application (as opposed to an internal or hired employee).
Authentication
The Thinkwise Platform provides four authentication types: RDBMS, Windows, Kerberos and IAM.
IAM authentication is intended to simplify the administration of large numbers of Intelligent Application Manager users. IAM authentication users are only registered in the Intelligent Application Manager and not in the database. During login, the account details are validated in the Intelligent Application Manager. The password is securely stored in the IAM database. The Update password task can be used by an administrator to set or update this password.
To specify a different authentication type for an application database, set the Authentication extended property of the application in IAM.
Login
menu Authorization > Users > tab Users > tab Form
The Login verification option determines if a user is required to use two-factor authentication:
- Password - the user logs in with a password only
- Password and SMS - the user logs in with a password and a code that is sent by SMS
- Password and email - the user logs in with a password and a code that is sent by email
- Password and TOTP token - the user logs in with a password and a code that is generated by a TOTP authenticator
SMS
To use email two-factor authentication in the Web user interface, the settings below need to be configured in the settings.ini
file or using IAM extended
properties. For the Mobile user interface, the settings below need to be configured in the appsettings.json
file of the application tier.
Parameter | Description |
---|---|
TwoFactorSmsMessageService | This parameter indicates which service implementation is used for SMS two-factor authentication. Additional service implementations may be added in the future, but for now the only valid value is TSFTwilioSmsMessageService. |
TwilioAccountSid | The SID of your Twilio account. This information can be found in Twilio's Console Dashboard. |
TwilioAccountAuthToken | The Auth Token of your Twilio account. This information can be found in Twilio's Console Dashboard. |
TwilioFromNumber | The Twilio phone number used to send the SMS message to the user. |
To use email two-factor authentication in the Web user interface, the settings below need to be configured in the settings.ini
file or using IAM extended
properties. For the Mobile user interface, the settings below need to be configured in the appsettings.json
file of the application tier.
Parameter | Description |
---|---|
TwoFactorEmailMessageService | This parameter indicates which email implementation is used for Email two-factor authentication. Additional implementations may be added in the future, but for now the only valid value is TSFSmtpMessageService. |
SmtpServer | The address of the SMTP server used to send the email. |
SmtpPort | The port on which the SMTP server listens. |
SmtpEnableSSL | Whether SSL will be used to provide transport-level encryption (yes/no). |
SmtpUser | The username used to authenticate with the SMTP server. |
SmtpPassword | The password used to authenticate with the SMTP server. |
SmtpFrom | The email address used to send the email to the user. |
SmtpFromDisplayName | The display name shown to the user as the sender of the email. |
TOTP
If TOTP authentication is used, the user receives a secret key code on first login. This code needs to be registered in a TOTP authenticator app, like Google Authenticator or Microsoft Authenticator, by entering the key or scanning the QR code. If the user has successfully registered their TOTP device, the TOTP device registered checkbox will be checked.
Every time the user wants to log in, they need to enter the time-based code generated by the TOTP authenticator app. To allow a fallback to email-based two-factor authentication, for example if the user does not have access to their smartphone, check the Allow fallback to email option.
- The Reset TOTP device task can be used to reset the TOTP secret key, for example when a user's smartphone is stolen.
- Indicium Universal The application name shown in the authenticator app is set in IAM: menu Settings > Global settings > field Title. This makes is possible to register a TOTP secret for the same user in multiple IAM databases in one authenticator app. If no title property is entered, the title 'Thinkwise' is shown in the authenticator app.
Password
For RDBMS and IAM authentication it is possible to specify an initial password. This password is used to generate a script for creating users on the database. It can be used to keep track of the initial password and communicate this password to the users. This password cannot be used to log on to the application. Make sure to clear this field after RDBMS users are created or the password for IAM users is updated.
The Allow change option indicates whether users are allowed to change their password from the user interfaces. Use the Expired option to set the initial state of the password:
- Not expired - The user can simply use the current password
- Change after login - After the user has logged in with their current password, they must change the password
- Reset before login - The user has to reset their password before they are allowed to log in
The system keeps track of how often a password is changed or reset. This number is incremented every time the user requests a new password or changes their password, and when the password is changed by the administrator.
Password strength
The minimum password strength for IAM authenticated users can be set in the global settings.
The following calculation is used to determine the password strength:
- The total password length gives up to 3 points (at 10 characters)
- Two uppercase characters and two lowercase characters gives 0.6 points
- Two numbers gives 0.6 points
- Two symbols gives 0.8 points.
Setting the minimum password strength to 5 will require the user to match all the password requirements. Setting the minimum password strength to 4 allows the user to skip either symbols, numbers or varying casing.
When the user attempts a password change and the password strength is insufficient, the user will be notified of the shortcomings of the desired password.
Password strength requirements for RDBMS accounts or Windows accounts is delegated to the database server or active directory.
Settings for UI adjustment
The settings described here apply only to end applications that are booted via IAM.
For each user in the end application a large number of settings are available for adjusting the user interface, e.g.:
- The default language.
- Menu items for adjusting the default user interface settings (via the User preferences menu).
- Resizing, collapsing, dragging and dropping elements in the user interface.
For more information about the possibilities, see the settings below in this chapter.
Menu Authorization > Users > tab Form
To set a default language
- In the User preferences area, in field Application language, select the default language.
To select one of the predefined configurations or create a new configuration manually, take the following steps:
To select a predefined configuration
In the User preferences area, in field Configurations, select one of the predefined configurations.
Available predefined configurations are:
- None - No user preferences are stored and the user preferences ribbon is hidden.
- Resize - Users can collapse and expand their menu and ribbon. Furthermore, they can change the sort sequence and column width in a grid view.
- Move - Resize plus the option to configure their own start objects and set the sort sequence of all subjects.
- OnOff - All options except for changing screen types.
- Complete - All user preferences options are available to the user.
To create a new configuration manually
In the User preferences area, open the Configuration field popup
.
In screen UP availability, open tab Form.
Check the boxes for the settings that should be available for the user.
Setting | Result in end-application |
---|---|
Menu settings availability | General menu settings in the application. |
Recommendations | Self-learning UI |
Application language | Select another language |
Screen type | Select another screen type |
Start empty with filter | Start with an empty table |
Number of locked columns | Change the columns |
Detail subject settings availability | Change the tab pages |
Grid settings availability | Change the columns |
Filter settings availability | Adjust the filter |
Search settings availability | Adjust the search view |
Settings for prefilter | Create or edit a prefilter |
Cube settings | Cube view settings |
User preferences configuration
Self-learning UI
Thinkwise's user interfaces are self-learning. This means that by analyzing a user’s way of working, IAM can recommend UI settings for that user. Simply accepting a suggestion immediately leads to an improvement in the user's experience. Examples of suggestions are:
- Open frequently used screens automatically at the application start up
- Open screens without data, if they are usually filtered immediately
- Customize the filter and search popups based on which fields are/are not used
- Save frequently used filters as standard (user defined prefilters).
Example: if a user frequently opens the customer screen and then filters on a customer, IAM can recommend to open the customer screen automatically, directly after the application has started. This screen will not immediately retrieve the customer details from the database, but directly display the filter screen. This leads to fewer user actions and a lower server load.
For each user, a user administrator can specify whether specific (or all) actions of the user are registered by the user interfaces. This analysis can also be reason to provide the user with additional training.
To enable the self-learning UI:
Menu Authorization > Users > tab Form
- Select a user.
- In the User preferences area, open the Configuration field popup
.
- In screen UP availability, open tab Form.
- In the Menu settings availability area: make sure Recommendations is selected (see User preferences for the configuration options).
Enabling UI recommendations
As a result, two buttons are added to the User preferences ribbon in the application: Generate (to generate the recommendations) and Show (to show and, if desired, select and apply the recommendations).
Show recommendations
Time period
By specifying a period, it is possible to set a start and end date for a user. Access to all of the application will automatically be denied when the end date is reached.
Additional information
Here you can provide additional user information, such as the company a user belongs to and the company-specific employee ID.
User information
User preferences
Contains the stored user preferences of the selected user.
The User preferences tab page in the Users screen is only available to Main administrators.
User preferences
Administrators
Overview of the IAM administrator roles of the selected user.
User groups
An overview of the user groups of which the current user is a member.
Session log
A log of all user sessions for the selected user. The session log is also available from the menu, in which case an overview of all users is displayed.
Two-factor log
A log of when a user is logged in using SMS, email or TOTP two-factor authentication.
Open id
A user's Open ID login.
Master data
Contains information about the user's country, location or department. This information is also available in the IAM analysis tools.
The Tags tab page can be used when information about users that is not already available in the Intelligent Application Manager needs to be maintained.