Browse
Tools
Categories

Functional Security

1 Assigning Roles for SQL Authenticated Users

SiteAudit functional security allows users to be placed into roles that limit what the user is able to do within SiteAudit. This article explains how to create SQL authenticated users and assign them to roles within a SiteAudit database, thereby restricting…

2 Assigning Roles for Windows Authenticated Users

SiteAudit requires a SQL database for its function. Once a SQL database is created, an authenticated user with the appropriate rights must log onto the SQL server and install the SiteAudit database schema. This article will focus on Windows authenticated…

3 Configuring SQL Express for Mixed Mode Authentication

Configuring SQL Express for Mixed Mode Authentication This article describes how to enable SQL Express Mixed Mode Authentication. SQL Express is installed silently when using the prerequisites downloaded from Netaphorâ„¢, which installs the application for…

4 Creating and Using DCF Files with SiteAudit

Creating and Using DCF Files with SiteAudit Starting with Netaphor SiteAuditâ„¢ Hosted version 7.0, features and integrations use DCF files (.sadcf) to connect to desired customer databases for data retrieval. SiteAudit products like Notifier, Scheduled Reports,…

5 Functional Security Roles

This article defines each of the functional security roles available in SiteAudit and what functions are permitted by users assigned to a role. Functional Security Roles and Permissions There are five functional security roles in SiteAudit. These roles are…

6 SiteAudit Functional Security

Functional security is a new feature introduced in SiteAudit version 6.2. This document describes the functional security features and includes links to additional articles to learn more about the features and how to implement SiteAudit functional security…

7 SQL Server Authentication Modes

In order to access databases on a SQL server, one must have a login account and be authenticated. The login is created by the SQL server system administrator and he/she indicates which type of authentication is required by the user. There are two forms of…