T6 offers a highly configurable security model, allowing administrators and managers to have detailed control over user and group access to the system's various functionalities. The structure is based on user profiles (such as Administrator, Manager, Analyst, and Planner), each with specific permissions that determine the possible actions within the application.
Security is managed through the Users, Groups, and Roles sections, integrated into the application’s main menu. These elements provide an efficient means for assigning permissions, managing access, and organizing responsibilities.
T6 functionalities are organized according to the access profiles assigned to users and groups. Below are the main highlights per profile:
Administrator | Manager | Analyst | Planner |
---|---|---|---|
Full management of application and user security; | Creation and viewing of dashboards, forms, and analyses (Profitability, What-If, Simulations); | Execution and viewing of workflows and formulas; | Data entry and deletion through web and Excel forms; |
Configuration of global parameters and integrations; | Execution and unlocking of data load routines and cubes; | Data export in XBRL format; | Access and task execution in workflows; |
Administration of data load routines; | Management of workflows, data tables, formulas, and processes; | Reading and writing comments in intermediate cells; | Viewing of instances and triggers; |
Control over scheduling, storage, authentication, custom themes, and use of T6 GPT. | Broad permissions over reports, application structure, and direct data access. | Restricted access to dashboards, reports, breakdowns, and forms. | Use of T6 GPT to support planning activities. |
Additionally, T6 has specific functionalities linked to Application Groups and Global Groups, such as:
Permissions can also be assigned to users and groups.
The main highlight is the management of read and write permissions on T6 objects, defining whether a specific user or group has access to certain objects with Read-Only or Read - Write options.
T6 features a security model that allows administrators and managers to easily and intuitively create, configure, and maintain system access and access to critical business model information.
Some T6 security settings can be accessed through the Users and Groups screens, since, like most security systems, T6 works with this concept.
A group provides a simple way to organize a large number of users. Instead of defining permissions and accesses individually, a group is created and assigned permissions and functionalities. Thus, all users belonging to the group will inherit its permissions and functionalities.
In most cases, the user will need a set of enabled functionalities to perform certain actions or access specific resources.
To confirm the necessary functionalities for the desired resources and/or actions, go to: T6 Help Center, locate the desired page, and check the prerequisites for use.
User Functionalities:
Functionality | Description |
---|---|
Select all | Selects all items listed |
Access T6 GPT | Enables access to T6 GPT, allowing the user to interact with T6’s artificial intelligence chat. |
Permissions in T6 control the level of access users and groups have to specific objects within the application. The system's security structure allows precise definition of who can view or edit each object, enabling granular control over data and features.
Permissions can be assigned to users or groups.
Permission Type | Description |
---|---|
Read Only | Grants the user the right to view the object without editing capabilities. |
Read - Write | Allows the user to view, edit, and save changes to the object. |
Permissions are independent per object. A single user may have read permission for one dashboard and write permission for another, for example.
Permissions are managed directly by the object owner, who is, by default, the item's creator. To configure permissions:
Only the object owner can change the permissions. For another user to take control, a Transfer of Ownership must be performed.
It is also possible to define object access permissions directly through the Users or Groups screen, available under the Access Control section.
To do this:
Permissions assigned via the Users or Groups screen have the same effect as those configured directly on the object and remain valid even after ownership transfer, as long as they are not removed.
Using groups for permission management is recommended, as it centralizes access administration and promotes scalability. When a user is added to a group with assigned permissions, that user automatically inherits those permissions.
Changes to a group’s permissions affect all its members in real time.