top of page

Users

Users

The user is a system macro object which has its unique name (login) and password. Using this login and password users can enter one of Terminus GPS interfaces where they can control their units (end users) or manage the system itself (users-managers).

A user has access rights to interact with other system objects (units, other users, resources, etc.). These rights are assigned by a system manager. Besides, a user can be a creator of these objects, which also affects the hierarchy of access rights. Manager's duty is to properly build this hierarchy.

Users as system objects also have some specific applications in Terminus GPS main interface, as described below (send SMS, control user activity, etc.).

User Properties ______________________________________________________________________________________________

User properties are configured when creating, editing or copying a user in a special dialog on several tabs. The availability of different tabs and parameters depends on the access you have towards the user. Two tabs are available in any case — General and Advanced. Some properties become uneditable if the user account is blocked.

General ______________________________________________________________________________________________________

This tab contains the basic properties like name, password, allowed activitly, etc. 

Users.JPG
General

Name


User name must be between 4 and 50 characters (read more about the Input Rules).

Password


A password is required for each user. To ensure a high quality of password protection, it is recommended to adhere to the following rules when creating it:

  • the minimum password length is 4 characters;

  • use of uppercase and lowercase letters;

  • use number or symbols along with letters.

You have to enter the password twice (the second time is in the Confirm password field).

Host mask


The hostmask can be applied to the user to restrict IP addresses from which this user can log on to the system (for example, to restrict access only to working computers). To set a mask, use the wildcard character *, for example, the hostmask can be set like this: 212.0.13.*. You can indicate several masks separated by commas. The maximum number of symbols in this field is 1024. If no mask is set, the user can log in from any computer.

Creator


Select the creator from the dropdown list. User's creator can be any other user. The creator is important to build the hierarchy of the access rights. The user inherits account and billing plan from the creator. The creator is assigned when the user is being created and cannot be changed afterwards.

Account


Here you can see to which account the user belongs to (if you have any access to this account). Account and creator cannot be changed.

Measurement system


Choose a measurement system which will be applied to the current user. This parameter is shown only upon creating a new user. For existing users, it can be changed by the converter. Moreover, users can change a measurement system by themselves in the monitoring system. To do so, it is necessary to summon the user settings dialog and choose a proper measurement system on the General Settings tab.

Can create items


This checkbox defines if the user can or cannot create units, users, accounts, resources, unit groups, routes, and retranslators.
 A user can be assigned a creator of objects regardless of the status of the option.

Can change password
Allow/forbid the user to change the password. If this option is enabled, then, according to the security rules, the user will be required to change the password at the first login.

Can send SMS
Allow/forbid the user to send SMS messages to drivers, units, and other users from Wialon main interface.
 However, this option does not affect the execution of the commands via SMS channel.

Enabled
If disabled, the user cannot log in to any interface of the system.

Can change settings
Activate this option so that the user can change the settings. If the option disabled, it becomes impossible to change the user settings and monitoring options.

 To edit most of these properties, you should have the Change flags for given user access right. Changing password requires also the Act as given user access right.

Access

 Access required: Manage user's access rights.

Here you can give the user access rights to such system objects as unitsresources (accounts)unit groupsroutes, and other users.

On the left, there is a list of objects. To quickly find the required one, use filters: select the object type in the dropdown list and set a name mask below. The objects that meet your request will be displayed in the list. You can sort them alphabetically or by access rights. To do this, click on the icon to the right of the dynamic filter.

The objects, to which the user already has any access, are highlighted in color. If there is no access, the background is transparent.

Select an object on the left and mark actions allowed to the user on the right. Find more information about the access rightshere.

Access
User Properties.JPG

Note that here you set the rights of a specific user to various objects of the system. However, the user, in turn, is also a system object and therefore can be accessed by other users. In other words, other users can obtain access rights toward this user. To set access to a user as a system object, open the properties dialog of some other user and choose Users in the drop-down filter.

Advanced  ___________________________________________________________________________________________________

Specify the email address to which the user will receive notifications from the administration of the service.

If you want to receive notifications about account blocking to the email address specified above, activate the Notify about account blocking by email option. Notifications start arriving daily 5 days prior to blocking. To work with this option, activate the Еmail notifications service in the account properties.

Advanced
User Properties3.JPG

These settings can be changed by users themselves — in the User Settings dialog.

 To edit these properties, the Edit not mentioned properties access right is required.

Custom Fields  _______________________________________________________________________________________________

 

Access required: View custom fields — to view general custom fields; Manage custom fields — to create, edit, and delete general custom fields for the given unit; View admin fields — administrative custom fields; Manage admin fields — to create, edit, and delete administrative fields.

On this tab, you can add any information about the user, whether it is a home address or working shift. In the left field enter the name of the field, in the right field its value. To save the custom field, click on the Add button. To delete the field, click Delete. At the end of the dialog edit, click OK in the lower right corner. The next time you open the dialog, the fields will be automatically sorted alphabetically. Part of the fields can be marked as administrative (checkbox in front of the field), i.e. they will only be visible to users with the appropriate rights.

Custom Fields
User PropertiesRestric.JPG

Logs ________________________________________________________________________________________________________

 Access required: Query reports or messages

In the log, you can see when a user logged in or out of the system, what service they used, from which host.  Specify the time period and click Show.

Logs
User PropertiesLog.JPG

Note.

Besides the log, user activity can be controlled in different reports that are available in the main intergace of Terminus GPS.

Manage Applications __________________________________________________________________________________________

Authorized Applications

This tab contains the list of applications that have any access to your account and data. To the left, there is an application name, to the right, you can see the access rights that the application has towards your data or account. To block an access for the application, it is necessary to delete the corresponding application from the list.

Mobile Notifications

This tab contains the list of applications which are allowed to send notifications to your mobile devices. To the left, there is an application name, to the right, you can see a device type. To block mobile notifications sending, it is necessary to delete the corresponding application from the list.

Manage Applications
User PropertiesApp.JPG
bottom of page