Skip to main content
Skip table of contents

User Management and Security

The User Management and Security module in Wise Municipal Manager provides comprehensive access control, user administration, and permission management capabilities specifically designed for municipal organizations. This module ensures proper segregation of duties, maintains audit trails, and supports compliance with municipal governance requirements.

image-20250813-074909.png

Administration – User setup

Key Features

Advanced User Administration

  • Centralized User Management: Single interface for managing all municipal system users

  • Role-Based Access Control: Hierarchical permission structure based on job functions

  • Profile-Based Setup: Predefined user profiles for common municipal roles

  • Access Control Lists: Granular permission control for specific system areas

Municipal-Specific Security

  • Department-Based Access: Control access based on municipal department structure

  • Service-Area Restrictions: Limit access to specific municipal services

  • Invoice Processing Security: Specialized permissions for periodic invoicing (RBR)

  • Resource-Based Filtering: Control access to specific resources and projects

Audit and Compliance

  • User Activity Tracking: Complete audit trail of user actions

  • Permission Change Logging: Track all permission modifications

  • Access Attempt Monitoring: Log successful and failed access attempts

  • Compliance Reporting: Generate reports for regulatory requirements

User Profile System

Wise User Profiles

image-20250813-075727.png

Wise User Profile

Profile Categories

image-20250813-075844.png

Wise User Profile - Setup

The system supports predefined profiles tailored to municipal organizational structures:

Executive Profiles:

  • Municipal Manager: Full system access with administrative privileges

  • Department Head: Department-specific management access

  • Finance Director: Financial reporting and budget management access

  • IT Administrator: System configuration and user management privileges

Operational Profiles:

  • Finance Officer: Accounting, invoicing, and financial transaction access

  • HR Specialist: Employee and payroll management access

  • Service Coordinator: Municipal service delivery and customer interaction

  • Maintenance Supervisor: Work request and asset management access

Support Profiles:

  • Clerk: Limited data entry and inquiry access

  • Intern: Read-only access to specified areas

  • Auditor: Read-only access to all areas for audit purposes

  • Consultant: Temporary access for specific projects

Profile Configuration

Each profile includes:

  • Menu Access: Which menu items and pages are visible

  • Data Permissions: Read, Insert, Modify, Delete rights by table

  • Functional Access: Access to specific business processes

  • Reporting Rights: Which reports can be generated and viewed

  • Export Capabilities: Permission to export data to Excel or other formats

Profile Assignment Process

Screenshot Placeholder: User profile assignment dialog showing user selection and profile options

Assignment Workflow

  1. User Creation: Create user account in Business Central

  2. Profile Selection: Choose appropriate Wise User Profile

  3. Department Assignment: Link user to municipal department(s)

  4. Resource Filtering: Configure resource and project access

  5. Special Permissions: Add role-specific permissions as needed

Bulk Assignment

  • Department-Wide: Assign profiles to entire departments

  • Template-Based: Use existing users as templates

  • Import-Based: Bulk import user assignments from Excel

  • Organizational Changes: Mass updates during reorganizations

Permission Structure

Standard Business Central Integration

Permission Set Architecture

The system extends Business Central's standard permission model:

Base Permission Sets:

  • SVE Permissions: Core Wise Municipal Manager permissions

  • SVE API: API access permissions for external integrations

  • SVE RBR Periodic Invoicing: Permissions for periodic invoice processing

  • SVE Salary Permissions: Payroll and salary statement permissions

Permission Inheritance

  • Role Hierarchies: Junior roles inherit permissions from senior roles

  • Department Inheritance: Department-specific permission cascading

  • Function-Based: Permissions grouped by business function

  • Data Classification: Permissions based on data sensitivity levels

Granular Access Control

Table-Level Permissions

Fine-grained control over data access:

RIMD Permissions:

  • R (Read): View data without modification capability

  • I (Insert): Create new records

  • M (Modify): Edit existing records

  • D (Delete): Remove records from system

  • X (Execute): Run pages, reports, and codeunits

Data Classification Levels:

  • Public: General municipal information

  • Internal: Department-specific data

  • Confidential: Sensitive employee or financial data

  • Restricted: Highly sensitive or regulated information

Field-Level Security

  • Masked Fields: Hide sensitive information (e.g., social security numbers)

  • Read-Only Fields: Prevent modification of critical data

  • Calculated Fields: Display derived information without exposing source data

  • Time-Based Access: Temporary access to specific fields

Specialized Access Controls

RBR (Periodic Invoicing) Security

image-20250813-080102.png

Access Control Per. Inv. (Period Invoices)

RBR Administrator Role

Special permissions for managing periodic invoicing:

Core Privileges:

  • Can Create Period: Permission to create new invoicing periods

  • Can Create Invoices: Authority to generate invoices for periods

  • Can Post Invoices: Permission to post generated invoices

  • Access Control: Administrative rights over RBR system

Invoice Type Security:

  • Type-Specific Access: Control by invoice type (utilities, taxes, etc.)

  • Customer Filtering: Limit access to specific customer groups

  • Amount Limits: Set maximum amounts for processing

  • Approval Workflows: Require approval for large transactions

RBR User Assignment

  1. Navigate to User ManagementUser Administration

  2. Select user for RBR access

  3. Enable RBR Admin User checkbox

  4. System automatically grants required permissions:

    • Creates access control records

    • Assigns invoice type permissions

    • Sets up default restrictions

Resource-Based Security

image-20250813-080426.png

Invoice type - Periodic invoices

Resource Filtering

Control access to specific business resources:

Employee Resource Filters:

  • Department Limitation: Access only to department employees

  • Project Assignment: View only assigned project resources

  • Cost Center: Restrict by cost center assignments

  • Location-Based: Geographic or facility-based restrictions

Configuration Process:

  1. Access User SetupResource Filters

  2. Define filter criteria by user

  3. Set resource types and ranges

  4. Apply time-based restrictions if needed

Limited User Access Control

Screenshot Placeholder: Limited user access control showing field-level restrictions

Advanced Field Restrictions

For users requiring limited system access:

Field-Level Controls:

  • Visible Fields: Define which fields user can see

  • Editable Fields: Specify which fields can be modified

  • Required Fields: Set mandatory field completion

  • Validation Rules: Custom validation for specific users

Use Cases:

  • Temporary Staff: Limited access during probationary periods

  • Contractors: Restricted access to contracted work areas

  • Interns: Educational access with safety restrictions

  • External Auditors: Read-only access with audit trail logging

User Administration Interface

Municipality User Administration

Administration Features

Centralized interface for managing all municipal system users:

User Overview:

  • User List: All system users with current status

  • Profile Assignment: Current Wise User Profile for each user

  • Special Roles: RBR Admin and other specialized roles

  • Last Activity: User login and activity information

Super User Requirements:

  • Only users with SUPER role can access user administration

  • Prevents unauthorized permission modifications

  • Maintains system security integrity

  • Supports separation of duties

Bulk Operations

  • Profile Updates: Change profiles for multiple users

  • Department Reassignment: Move users between departments

  • Permission Synchronization: Update permissions system-wide

  • Deactivation: Temporarily or permanently disable user access

Permission Lookup and Troubleshooting

Permission Analysis Tools

Help administrators diagnose access issues:

Permission Lookup:

  • User Permission Analysis: View all permissions for specific user

  • Object Access Check: Verify access to specific pages/reports

  • Missing Permission Detection: Identify missing permissions for desired access

  • Permission Source Tracking: Determine where permissions originate

Troubleshooting Workflow:

  1. User reports access issue

  2. Administrator runs permission lookup

  3. System identifies missing permissions

  4. Administrator assigns appropriate permission set or profile

  5. User tests access and confirms resolution

Security Best Practices

User Account Management

Screenshot Placeholder: Security checklist showing best practices implementation

Account Lifecycle Management

  • Onboarding Process: Standardized new user setup

  • Regular Reviews: Periodic access rights validation

  • Offboarding: Systematic user deactivation process

  • Account Monitoring: Active account usage tracking

Password and Authentication

  • Strong Password Requirements: Municipal-standard password policies

  • Multi-Factor Authentication: Enhanced security for privileged accounts

  • Session Management: Automatic logout for inactive sessions

  • Login Monitoring: Track and alert on suspicious login patterns

Role-Based Security Design

Principle of Least Privilege

  • Minimum Required Access: Users receive only necessary permissions

  • Temporary Elevation: Short-term additional access for specific tasks

  • Regular Validation: Periodic review of user permission requirements

  • Documentation: Clear documentation of permission rationale

Segregation of Duties

  • Financial Controls: Separate creation, approval, and posting functions

  • Asset Management: Separate acquisition, maintenance, and disposal roles

  • Payroll Processing: Separate data entry, calculation, and payment functions

  • Audit Independence: Separate audit access from operational functions

Compliance and Auditing

Audit Trail Requirements

  • User Action Logging: Complete log of user activities

  • Permission Change Tracking: Record all permission modifications

  • Data Access Logging: Track access to sensitive information

  • Report Generation Auditing: Log report generation and distribution

Regulatory Compliance

  • Municipal Governance: Align with local government requirements

  • Financial Regulations: Support financial reporting compliance

  • Privacy Protection: Ensure personal data protection compliance

  • Audit Standards: Support internal and external audit requirements

Integration with Business Central Security

Native Security Extension

Enhanced Permission Model

  • Extended Permission Sets: Wise-specific permissions integrated with BC standard

  • Custom Roles: Municipal-specific roles beyond standard BC roles

  • Data Classification: Enhanced data sensitivity classification

  • Field Security: Extended field-level security capabilities

Security Synchronization

  • User Setup Integration: Wise profiles synchronized with BC user setup

  • Permission Inheritance: Wise permissions complement BC permissions

  • Role Center Integration: Security-aware role center customization

  • Menu Filtering: Dynamic menu filtering based on permissions

External System Integration

API Security

  • OAuth 2.0 Support: Secure API authentication

  • Token Management: Secure token generation and validation

  • Rate Limiting: Protect against API abuse

  • Audit Logging: Complete API access logging

Single Sign-On (SSO)

  • Active Directory Integration: Corporate directory synchronization

  • SAML Support: Identity provider integration

  • Multi-Domain Support: Support for municipal network structures

  • Group Membership: Automatic permission assignment based on AD groups

Troubleshooting Common Issues

Access Permission Problems

"You do not have permission to access this page"

Cause: User lacks necessary permission set or profile assignment
Solutions:

  1. Check user's assigned Wise User Profile

  2. Verify Business Central permission set assignments

  3. Confirm user is active and not blocked

  4. Review any resource filters that might restrict access

"Object not found" or Missing Menu Items

Cause: Permission sets not properly assigned or menu customization issues
Solutions:

  1. Assign appropriate SVE Permissions set

  2. Check role center customization

  3. Verify object permissions in permission sets

  4. Clear user personalization if necessary

RBR Access Issues

Cannot Access RBR Invoice Processing

Cause: RBR Administrator rights not properly configured
Solutions:

  1. Navigate to User Administration

  2. Enable RBR Admin User for the user

  3. Verify RBR Access Control records are created

  4. Check invoice type-specific permissions

Cannot Create or Modify Invoice Periods

Cause: Insufficient RBR permissions or access control restrictions
Solutions:

  1. Verify RBR Access Control Per Invoice settings

  2. Check "Can Create Period" permission

  3. Confirm invoice type access rights

  4. Review any customer or amount limitations

Profile and Permission Synchronization

Profile Changes Not Taking Effect

Cause: Permission cache or synchronization delays
Solutions:

  1. Sign out and sign back in to refresh permissions

  2. Check if permission set assignments match profile requirements

  3. Verify profile configuration is complete

  4. Contact system administrator for permission cache refresh

Key Benefits

  • Enhanced Security: Municipal-specific security model beyond standard ERP

  • Simplified Administration: Centralized user and permission management

  • Compliance Support: Built-in support for municipal governance requirements

  • Audit Trail: Complete tracking of user activities and permission changes

  • Scalability: Support for large municipal organizations with complex structures

  • Integration: Seamless integration with Business Central security framework

  • Flexibility: Configurable to meet specific municipal organizational needs

  • User Experience: Intuitive interface for both administrators and end users

The User Management and Security module provides municipalities with enterprise-grade security capabilities while maintaining the flexibility needed for diverse municipal operations and organizational structures.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.