Skip to main content
Announcements
Introducing Qlik Answers: A plug-and-play, Generative AI powered RAG solution. READ ALL ABOUT IT!
cancel
Showing results for 
Search instead for 
Did you mean: 
klmontoya
Contributor
Contributor

Replicate Secuity

I was wondering how other users have handled end-point and task security since Replicate does not provide this level granular level security to these objects.  We AD Groups by role for access but Designer role users can modify other tasks that they didn't create.  We have multiple teams that are responsible for their tasks and we don't want other users modifying them but the tool allow this action as a user.  In addition it there is no logging of user changes since there is no actual logon to Replicate.

 

Labels (1)
4 Replies
klmontoya
Contributor
Contributor
Author

I just wanted to add, access is granted to Qlik QEM/AEM Windows console.

DesmondWOO
Support
Support

Hi @klmontoya ,

Thanks for reaching out to us in the Qlik Community.

Regarding the security level question, please try following these steps if this helps:

  1. In the QEM console, right click on your task and then click "Task Permission".
  2. Click "Disable inheritance" and select "Remove all inherited permissions from this object".
  3. Click "Disable". All permission settings will be clear.
  4. Add your account with Designer/Admin right.

Regards,
Desmond

Help users find answers! Do not forget to mark a solution that worked for you! If already marked, give it a thumbs up!
DesmondWOO
Support
Support

Hi @klmontoya ,

About logging of user changes, please check "Creating an audit trail". 

Regards,
Desmond

Help users find answers! Do not forget to mark a solution that worked for you! If already marked, give it a thumbs up!
SushilKumar
Support
Support

Hello team,

 

If our response has been helpful, please consider clicking "Accept as Solution". This will assist other users in easily finding the answer.

 

Regards,

Sushil Kumar