Before Intelligence Central can start sending email notifications, the email notifications service must be enabled on the Intelligence Central server. In addition, the SMTP mail server must be configured. Both of these actions can be performed by a user with the Administrator role.
A user with the Administrator role can also subscribe/unsubscribe individual users to the email notification service.
To enable email notifications and configure the SMTP mail server
To subscribe/unsubscribe users (server-level)
A user with the Administrator role can specify which types of email notifications each individual user can receive.
Any user can specify the email notification options for their own user account.
To change a user's email subscriptions
|
Note: Email Notifications must be enabled on the Intelligence Central server before the Admin Digest can be sent. In addition, the user must be on the Subscribers list (Administration | Server | Notifications). See Server Email Notification Settings for more information. |
In addition to the other server-related activities described elsewhere in this document, users with the Administrator role can also perform the following:
By default the session time out value is 60 minutes and the remember me interval is 30 days (when remember me option is enabled , user do not need to input credential again when login Toad Intelligence Central Web Console during the remember me interval ).
To specify the value of session time out and remember me interval
Admin users now can specify which user roles are allowed to create user groups. For more information about Roles, see User Roles.
The Audit Log allows you to download a log of activity on Toad Intelligence Central for a specific time period.
The log is a simple spreadsheet and includes the following information:
To download the audit log
You can influence the design of future versions of Toad Intelligence Central and help us improve its quality, reliability and performance.
To enable/disable user experience feedback
Refer also to the Privacy Statement.
Users with an Administrator role are automatically granted Manage privileges to all objects on Toad Intelligence Central. See User Roles for more information.
In addition to the following object-management activities, the Web interface provides object usage reports.
In the Web interface, use the Home page to view the objects in Intelligence Central. You can also view a list of objects per user (or group) on the Users page (or Groups page).
Users can see only the objects that they own or that have been shared with them, with the exception of the Administrator. The Administrator can view all objects on Intelligence Central.
To view objects and object details
When a user with an Administrator role generates a list of objects they see all objects on Toad Intelligence Central. When any other user generates a list of objects they see the objects for which they have Share or Manage rights. Another user may not see all the objects that the Administrator can see.
Show the objects owned by a particular user
From a web browser with log in to Intelligence Central, click Administration | Users and select the user. The objects owned by that user are listed in the Published Objects pane. Tabs show the number of objects that are Private (to that user) and Shared (with other Toad Intelligence Central users). Click the Private / Shared tabs to show / hide these objects.
Show the objects shared with a particular user
From a web browser with log in to Intelligence Central, click Administration | Users and select the user. The objects shared with that user are listed in the Shared Objects pane.
Show the objects shared with a particular group
From a web browser with log in to Intelligence Central, click Administration | Groups and select the group. Objects shared with that group are listed in the Shared Objects pane.
To move objects
On the Home page, you can drag-and-drop an object to move it to another folder. You can also relocate an object by selecting the destination folder in the selected object's Details pane. Users with the Administrator role or manage privileges to the object can move an object (between non-secured folders). An object cannot be moved if it is locked by another user.
Restrictions:
To move folders
On the Home page, you can drag-and-drop a folder to move it. To move a folder, a user must have the Administrator role or manage privileges to all objects in the folder. A folder cannot be moved if an object in the folder is locked by another user.
Restrictions:
See About Secured Folders for more information about secured folders.
Data connectivity functionality allows Toad Data Point users to publish data objects (views, snapshots, and datasets) to Intelligence Central. Data objects are published to Intelligence Central as a way to store and share data from remote data sources.
|
Note: A Toad Intelligence Central Data Connectivity license is required to enable data connectivity functionality in Intelligence Central. |
ODBC Connectivity
When data is published from a remote data source by a Toad Data Point user, the connection information is stored on Intelligence Central. Intelligence Central uses ODBC connectivity to connect to relational database sources that have been defined by Toad Data Point.
|
Note: To connect to data sources using ODBC connectivity, supporting ODBC drivers and necessary client files must be installed on the Toad Intelligence Central server host. |
User Access to Remote Data Source - Authentication
When a Toad Data Point user publishes a data object to Intelligence Central, the object is associated with a particular data source connection. This data source connection in Intelligence Central must have a login ID (or authentication key) to use when connecting to the remote data source. This ID / authentication key is created when the object is published and can be either shared or personal. A shared ID / authentication key can be used by any user when accessing the remote source. A personal ID / authentication key requires that each user log in using their own personal login credentials when accessing the remote source.
Users can provide login credentials through the Web interface (Web server) for an object that requires authentication.
In the Details pane, click the data source link in the Source field to open the Alter Authentication dialog.
For an object with a shared key applied, only users with Manage privileges to the object can open the Alter Authentication dialog through the data source link. For other users, the data source link is disabled.
See Alter Authentication for more information.
The ability of any user, including a user with an Administrator role, to
The following table describes the origin of data and the authentication requirements for the data objects in Intelligence Central.
Icon | Object | Description |
---|---|---|
Tables | Tables are tables of data mapped from data source mappable objects. The data is sourced direct from the data source. Authentication is required to view the contents of the object. | |
|
Views |
Views are saved SQL statements. When the SQL statement is executed, data is sourced direct from the data source. Authentication is required to view the result set if the object was published with a personal key. Authentication is not required if published with a shared key. Beginning with Intelligence Central 4.3, a view can have either a personal key or a shared key applied, but not both. |
|
Snapshots |
Snapshots are the result set of an executed SQL statement (View) or table. The data is stored on Toad Intelligence Central. Authentication is not required to view the result set, as snapshots are published with a shared key. |
|
Mappable Objects |
Mappable objects are data source objects that can be potentially mapped to tables. Authentication is required to list mappable objects and map tables. |
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. 使用条款 隐私 Cookie Preference Center