Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
I was wondering how other users have handled end-point and task security since Replicate does not provide this level granular level security to these objects. We AD Groups by role for access but Designer role users can modify other tasks that they didn't create. We have multiple teams that are responsible for their tasks and we don't want other users modifying them but the tool allow this action as a user. In addition it there is no logging of user changes since there is no actual logon to Replicate.
I just wanted to add, access is granted to Qlik QEM/AEM Windows console.
Hi @klmontoya ,
Thanks for reaching out to us in the Qlik Community.
Regarding the security level question, please try following these steps if this helps:
Regards,
Desmond
Hi @klmontoya ,
About logging of user changes, please check "Creating an audit trail".
Regards,
Desmond
Hello team,
If our response has been helpful, please consider clicking "Accept as Solution". This will assist other users in easily finding the answer.
Regards,
Sushil Kumar