User authentication and permission management (UAP) module
User authentication and permission management (UAP) module
The
procedures described below outline the management of the additional user
authentication and permission management (UAP) module, including: - General
introduction. - User authentication and management.
- User role and permission management.
1. General introduction
The main function of the User Authentication and Permissions (UAP) module is to authenticate users and define the actions they can perform in the software. This additional module enables controlled access to laboratory data, systems, and resources to ensure compliance with GLP regulations.
2. User authentication
When connecting to the software, the User Authentication and Permissions (UAP) module verifies the user's identity by checking their credentials, such as login name and password. The UAP module allows user management , either locally in the system (LAN1 connection, direct to PC) or centrally via an LDAP directory service ( = Lightweight Directory Access Protocol, LAN2 connection, recommended configuration in a GLP context).
Once you have entered your login details, the CONNECT button will become available. This will allow you to access the system and the software's home page.
Please note that when you first connect, your browser may display an alert because it does not recognise the system as a ‘reassuring website’ for questions relating to the navigator's certificate. Simply click on ‘advanced settings’ and ‘continue to the site’ in order to access the authentication page.
B- LDAP authentication - Network, LAN 2 connection:
For LDAP accounts, your credentials will be those stored and managed centrally in the internal LDAP directory. Ensure you select LDAP from the list of authentication servers.
For the first connection, even if the system is networked, use the previous LOCAL mode authentication to access the system. Then, for LDAP account configuration, contact your internal IT department. Refer to the user manual in the following section: Administrator: Creating and Managing Centralised Users using an LDAP Directory.
"Administrator: Creating and Managing Centralised Users using an LDAP Directory."
Configuring LDAP Directory
To use LDAP credentials, the system must be connected to the LDAP directory. Follow these steps:
Click the gear icon in the top right corner [1].
Select MANAGE LDAP CONFIG [2] to access the menu shown below [3]:
LDAP Configuration Menu
Enter the following parameters to bind the system with the LDAP server:
LDAP server URL:
ldap://\<hostname_or_ip\> for secure mode ldaps://\<hostname_or_ip\>,
Base DN: the level from which the LDAP module will start searching (usually DC=company,DC=com),
Username Attribute: the LDAP attribute where user login is stored (usually uid)
Start TLS: yes or no (usually: no)
Expiration time: set the LDAP expiration time parameter
This parameter might be used to automatically provision which group from the LDAP is allowed to connect to the system.
User: User account for performing searches (must be a consumer account without special rights except reading rights),
Password: password of the user allowed to connect to the LDAP directory
Important: For security reasons and privacy enforcement, it is recommended to use the secured ldaps protocol for communication with the server.
Important: All users must have an email associated with their account in the LDAP server.
Once you have entered your local admin ID or your LDAP credentials, the CONNECT button will become available. This will allow you to access the system and the software's home page.
Software Home page
C- User visibility and logout
When you no longer need to use the system, you can log out for security reasons. To do so: Click on the profile button in the top left corner of the home page, then click on the LOGOUT button.
Logout procedure
Note that this icon and pop-up also allow you to:
- Change your password with CHANGE PASSWORD when using a LOCAL account (with LDAP authentication, the password will automatically adjust with changes to the internal directory)
- View and interact with other people connected to the system: If several people are connected, the icon
will change colour to notify you of the presence of an additional user. You can then communicate with each other as needed.
An automatic logout time is built into the system to log out a user automatically after a period of inactivity. This time can be changed as needed.
3. User management
A- Creation and modification
SYSTEM ADMINISTRATOR accounts have the privilege of creating user profiles and/or modifying the role and permissions associated with a user.
To do this, click on the cog icon in the top right-hand corner of the home page.
Then select the MANAGE USERS button [2], which will take you to the user management page.
This page allows a user with the SYSTEM ADMINISTRATOR role to:
o Create new local users [3];
- Click on the + button in the bottom right corner to add a new local user [3]. Enter their details: Display name, Email (Login) and Password. You can also assign them a role (with more or less restrictive permissions depending on the role).
o Modify user information [4];
o Change user passwords [4];
o Define user roles to assign permissions (see section 8.2 in the ‘Roles’ column).
Please note that for LDAP configuration, users must log in to the system at least once to be provisioned. During the first authentications, they will not be automatically assigned a role and will not have any permissions to interact with the software. It is up to the SYSTEM ADMINISTRATOR to modify the user's role after their first authentication.
The buttons will appear as follows when a user is authenticated for the first time in LDAP:
B- User Deactivation
It is not possible to delete a user from the system for traceability reasons (configuration linked to the AUDIT TRAIL add-on module). However, when a user no longer needs access to the system, the administrator can deactivate them -> A deactivated user is no longer authorised to log in to the system.
To deactivate a user:
• Click on the ‘three dots button’ and select EDIT [4].
• Uncheck the box in the ACTIVE column for the corresponding user.
4. User role and permission.
A- User role management
Authorisation management in the LASA software is based on the roles assigned to each user within the system. A role consists of a specific set of authorisations that the administrator can grant or deny to a user to perform specific actions in the software.
The software is preconfigured with four distinct user roles, each with its own set of permissions. Permissions can be customised as needed to align with internal standard operating procedures.
User Roles - Default Permission Details:
Role
Name
Default
Permissions
None
When a user is created, this default role grants no
permissions except for logging into the system.
User
Users with this role have read-only access to
studies. They are unable to create, save records, perform analysis, or export
reports.
Technician
Technicians can access open studies, create and save
records, perform analysis, and export reports. However, they are restricted
from creating, renaming, modifying, deleting, or archiving studies.
Study
Director
Study Directors have administrative privileges on
studies, allowing them to create, save, approve, and reopen records. They can
also create, rename, modify, delete, or archive their own studies or those
assigned to them.
System
Administrator
This role has full access to all features, including
managing users and studies, creating, modifying, deleting, and archiving
records, system configuration, updates, and complete access to all
data/studies.
To edit a
user ROLE, Click the “3 dots” icon in the “Actions” column of the user’s row
that needs to be characterized, then choose `Edit` [3].The user to be edited
will move to the top of the list; choose the desired user role from the
drop-down list in the “Groups” column [4]. Confirm the modification [5].
B- Permissions management
The administrator can easily configure permissions for specific user roles: A dedicated page is available in the software, providing access to a permissions matrix organised by major software action categories. This allows you to grant or deny all listed actions for the four defined roles.
To access the permission matrix, click on the gear button in the upper right corner [1], then on the MANAGE PERMISSIONS button [2].
The actions are grouped into ‘broad categories’: Default System Configuration, System, Study, Sessions, Data Management, Analyse, Acquisition, Users, etc. Simply tick one or more actions to assign them to a user role and allow that role to execute them [4].
Conversely, to remove permissions, simply uncheck one or more actions to remove them from a user role.
As a reminder, when a permission is not assigned to a user, it will appear as follows in the software:
The following article describes how to manage data transfer between an acquisition system and an analysis server (Local or CLOUD). Introduction and prerequisites about the feature Introduction and system configuration details: The data transfer ...
This article details how to use the solution software module to perform the ECG delineation. 1. What is the ECG delineation module? The system provides 3 biosignals: the initial cardiac parameters provided in the software by the ECG analyzer module ...
In this article, you'll find out how to create, back-up and delete your study data. A) Study and session backup 1- Study export The lasa software implement mecanisms to export the complete and compressed database of a study. Raw data files and their ...
This article provides the key steps for data analysis with Lasa software and data export to Excel. The Excel file containing the physiological variables calculated for several animals studied can be used to draw initial conclusions or to prepare the ...
This video explains how to design an experimental protocol in the solution software. KEY STEP IN STUDY DESIGN Groups and subjects creation A study consists of four parts: GROUPS, PHASES, ACQUISITION, and SESSIONS. It is mandatory in the software to ...