Back to Security

 

Overview

The overall Qbyte Metrix Security architecture incorporates access control, data security and auditing.  Access control ensures actions that invoke functionality within Qbyte Metrix will execute with valid credentials.  Auditing provides a comprehensive method to track changes over time. 

Access control provides clients with the ability to control access to Qbyte Metrix at several levels ranging from very general to very granular. 

Auditing takes two forms:

This page will focus mainly on Access Control.  

Users

Each Qbyte Metrix user requires an Oracle database user (Oracle User Account). When a user inputs their credentials, those credentials are validated against that database user.  

Password Aging and Validation

Qbyte Metrix supports password aging and password verification. This functionality is implemented by leveraging Oracle’s functionality in this area. It is accomplished by creating Database (DB) profiles and then assigning these profiles to DB users. Qbyte Metrix traps various Oracle messages and displays appropriate error messages to the user.

Note: Please consult Oracle documentation for information on how to setup Oracle profiles for this purpose.

Requiring a Qbyte Metrix user to first be setup as an Oracle database user provides the client with the ability to set customized password security rules to handle the following situations:

The special characters that are not valid for password use " ` ~ & |

P2 hosts the Qbyte Metrix application for many clients.  These clients use an application called Access Management to create and maintain all users.  Additionally, users use the Access Management application to change their password as it is then synchronized for all P2 products.  Hosted clients manage User Roles within Qbyte Metrix. 

For non-hosted clients (the Qbyte Metrix application is in-house), clients configure users within Qbyte Metrix and users will maintain their passwords within Qbyte Metrix.

Within the Qbyte Metrix application, clients can access Qbyte Metrix Reporting through a link on the Main screen that will open the Optix Reporting tool in a new browser window.  Logging into Optix is not required as authentication is shared.

User Security Configuration in Qbyte Metrix

User ID/Names are configured in the Administration --> Users -->  Details tab.  Clients can indicate if a user is active or inactive.  Inactive users appear with brackets { } around the User Name and are displayed at the bottom of each dropdown list for User ID, PA Responsible and Individual Responsible. This allows easier selection of Active Users.  User ID’s cannot be deleted once they are referenced as a PA or Individual Responsible.

User Roles:

A user is assigned Corporate level roles through the Administration --> Users --> Roles tab.  Each user can be assigned multiple roles.  If the user is assigned multiple roles, the role with the greatest level of permission (for the function) is used.  User roles are not production date centric.

A user can be granted ‘All Control Groups Access’ which will allow the user to see all Control Groups in the Explorer screen for the Region they have access to.  Once in Explorer, a user’s control group role, association to a control group and their corporate role will determine what they can see and do to each Control Group. 

User Regions:

Users are granted access to Regions through the Administration --> User Region Maintenance screen. Users typically have a default region they access most of the time.  Users can change their region in any session and they can set or change their default region at any time.  Access to Regions is not production date centric.  Users are only able to select/switch to a region they have access to (only regions the user has access to will appear in the drop-down list of available regions).  

A users must have been granted access to at least one Region before they can see any Qbyte Metrix application screens.

User Profile:

Within the Administration --> User Profile screen, clients can:

Control Group Security

Many daily actions such as data entry, changing master data and running processes are done at a Control Group level so these functions are linked to Control Group Security Roles. 

At the Control Group level, a user can either be granted a specific Control Group Role or they can be associated to a Control Group.

Users that have been granted ‘All Control Group Access’ will see all Control Groups in the Explorer screens but their privileges within each control group depends on their  control group/corporate role.

Security Roles

Qbyte Metrix currently has 125+ Secured Components that describe common activities, such as: Run Process, Well Maintenance, User Maintenance, Pricing Edit, Battery Balance Edit, Close Month End. 

Each of these components can be assigned one of three Permissions:  Full Access, View Only or No Access.

A combination of Secured Components and the associated Permission for each of them are grouped together to form a Security Role.  Security roles are then assigned to users to determine everything a user can see or do within Qbyte Metrix, i.e. view data vs. edit, run processes, etc. 

To simplify the security configuration for each client, P2 has created seven pre-defined roles with generic/common titles.   Clients can change these seeded roles, copy them to create new roles or build new roles from scratch.

The following roles relate to Corporate level security:

ADMINISTRATOR:  full access to most operations

SUPERVISOR: full access to many screens and view access to users/roles and system configurations

PRODACCOUNTANT: full access to many screens required for monthly work and no access to administration type screens and functions

INQUIRYONLY: inquiry only to most areas of the system and No Access to important screens and functions.

The following roles relate to Control Group level security. 

CGINQUIRIESONLY – Control Group – Inquiry Only

CGMONTHLYWRK – Control Group – Monthly Work

CGMONTHLYWRKMSTR – Control Group – Monthly Work & Master Changes