This manual addresses the importance of security in system configuration, highlighting the need to protect valuable information. It allows administrators to create, edit, and remove users, as well as assign permissions, roles, and specific profiles, such as administrators, managers, and analysts. Various functionalities are covered, such as:
To be able to create and edit users in T6, some Features need to be enabled:
A user will only have access to objects they own or have permissions for.
All users must retain the same access when migrating from previous versions to a more recent one.
When migrating the system to a current version, the system creates several global groups, one for each existing global functionality, and automatically includes users in them, maintaining existing access.
Security is one of the most important aspects of any organization. All information controlled by CPM (Corporate Performance Management) systems, such as T6, is extremely valuable and should not be accessed by just anyone. Therefore, the T6 solution must be configured solidly and efficiently to ensure that information is protected, and only authorized personnel have access to it.
When implementing a security model, it is necessary to consider the business model requirements and the effects of this choice in terms of performance and scalability.
T6 has a security model that allows administrators and managers to create, configure, and maintain system access and critical information within the business model in a simple and intuitive way.
Some security configurations in T6 can be accessed through the Users screen, as, like most security systems, T6 operates with the concept of users. To perform any task within T6, a valid login and password are required.
In the main menu of T6, under the Access Control section, you will find the following options:
We will select User and be directed to an Explorer tab with the list of T6 users.
When accessing the Users section, the T6 user list will be displayed. This screen is accessed by system administrators and managers who have the role of managing users.
In the user list, T6 users are displayed along with some information: Name (user’s name), Date (user creation date), Type (object type in T6), Description (shows the user’s email), Code (object code, automatically generated), Order, and Owner (displays the owner of the user).
Among the actions we can perform are the following tasks:
Also in the listing, next to the title of each column, there are buttons to facilitate viewing and filtering users:
: Click to open a side panel with filtering options. It will display rows according to the selected filter. There are two "boxes", the first where we can click the button:
to show filtering options (equals to; different from; starts with; ends with; contains; does not contain), and the second where we will insert what we want to filter. After entering, click
, and the list will be updated, displaying only what fits the filter;

: Clicking will change the order of the items in the list, either ascending or descending.
The basic premise of a user is that they must be assigned a specific profile. Profiles allow users to be categorized based on their role within the business model and thus grant or restrict access or configuration rights to certain areas within T6.
When creating a user, we must define a licensed profile for planning and consolidation, among the following options:
We can change the profile of an already created user by selecting it in the list and clicking
.
In the case of on-premises applications (installed in the client environment), user profiles must be distributed according to the licenses purchased by the client.
It is possible to check the profiles available to the client in Settings >> Licenses, by clicking the magnifying glass icon next to the license.
To create a new user in T6, follow these steps:
After the user is created, we can edit them to change some information if necessary. To do so, select the user and click on
.
This functionality allows you to delete a user's record from the application. Removed users cannot be recovered.
To “Remove User”:
A user can only be removed if they are not associated with any task as a Planner/Data Reporting Responsible or Reviewer, and if they are not associated with any group.
User impersonation in T6 can be used to "assume" the identity of a specific user within the system. This allows us to view data and objects shared between the impersonated user and the logged-in user.
To use user impersonation, follow these steps:
, we will be automatically re-logged in without the need to re-enter credentials.The objects displayed in the explorer will be an intersection of the original user and the impersonated user, meaning only objects common to both users will be shown.
When selecting a user, we can modify their permissions. To do so, in the Security section of the ribbon, click on
. A side panel will open with the following options:
in the security section of the ribbon.In Groups, a list of groups will be displayed, showing:
To add a user to a group, follow these steps:
to display the selected groups and available groups for selection;
To remove a user from a group, follow these steps:
to display the selected groups;
A user can only add another user to a group if they have permission in the group;
For more information on group creation and configuration, visit: Security - Groups
After selecting a user from the list, click on
in the security section of the ribbon.
In Applications, a list of applications the user has access to will be displayed.
To grant application access to a user, follow these steps:
to display the selected applications and available applications for selection;
To remove user access to applications:
to display the selected applications;
The selected profile in the profile selection box must be equal to or lower than the licensed user profile!
After selecting a user from the list, click on
in the security section of the ribbon.
In Roles, a list of roles the user has access to will be displayed.
To add roles to a user, follow these steps:
to display the selected roles and available roles for selection;
To remove roles from a user, follow these steps:
to display the selected roles and available roles for selection;
Roles function as permissions, enabling or restricting access to cube data. This depends on how they are configured.
For more information on creating and configuring roles, visit: Security - Roles
in the security section of the ribbon.In Functionalities, you can manage the features the user can execute within a specific application. To configure these, follow the steps below:
In Application, click on
to display the applications available to the user;
In User Resources, you can manage the features of each profile. Click on
to select functionalities through a checkbox:
| Functionality |
|---|
| Select all |
| Manage application security (full)(multi-app) |
| Manage system users |
| Manage system parameters and settings |
| Manage load routines |
| Manager |
|---|
| Select all |
| Create and view dashboards/maps |
| Create and view data entry forms |
| Create and view profitability analysis |
| Create and view what-if scenarios |
| Unlock cubes locked by another user |
| Execute data loads |
| Manage lane structure |
| Manage data table structure |
| Manage trigger structure |
| Manage process structure |
| Manage application structure/model |
| Manage application security |
| Manage formulas |
| Manage Workflow |
| Manage XBRL |
| Enable formula editing |
| Enable formula execution |
| Pause instance |
| Personify action |
| Pin instance |
| Publish process |
| Synchronize management reports |
| Sysphera Excel Add-In with all functionalities |
| Transfer responsibility for instances |
| View process |
| New scenario wizard |
| Simulation wizard |
| Analyst |
|---|
| Select all |
| Act in the workflow with any task type |
| Execute formulas in forms |
| Export XBRL |
| Allow reading of comments in intermediate-level cells |
| Allow reading and writing of comments in intermediate-level cells |
| View dashboard |
| View details |
| View formula |
| View data entry forms |
| View management reports |
Only functionalities according to the profile defined in the Application tab will be enabled.
To remove functionalities, uncheck the checkbox to remove a specific functionality, or click on
to remove all functionalities from a profile.
Click on
;
To finish, click on
.
We also have Group Resources, but they are only for viewing. For editing, you need to access through Groups.
in the security section of the ribbon;In Permissions, we will define which objects the user can edit and view or only view, by following these steps:
to display the objects available in the system, the path, and a selection box for permission assignment;
A user can only grant permissions to objects for which they have permission.
Services were created to allow an external service to connect to T6 via API in a practical way.
They are linked to the user and use the user's permissions and functionalities;
Services will be used in server-to-server situations;
When a service wants to consume data from T6 without the need to access the interface and without the need for a logged-in user;
To create a service, follow these steps:
to register a new service;
: Click to show or hide the generated token;
: Click to copy the token to the clipboard;qablue.tech6cloud.com/api/Service/Execute (in this example, qablue is the name of your domain.);
;
.The generated token is used to make a request to the application via the API: qablue.tech6cloud.com/api/Service/Execute;
In the headers, we will only include Content-Type since we are sending content to T6. The method used will always be POST.
In the Request Body, we will define what will be done through the service. The first required information is a URL (the URL will be the internal T6 service you want to use), then you must provide the generated Token, which will authenticate the service (if the token has expired or is invalid, execution will be blocked with an error). With these two pieces of information, you can execute the API and receive a response with the requested information.
If we add Data to the Request Body, the system will internally recognize it as a POST.
Example of Request Body:
{
"Url":"Resource/GetWords",
"Token":"2b2a8d095b838740bc91016cd929ab0d771",
"Data":["Options","Help","Logout"]
}
The services tab is only displayed for multi-admin users.
If logged in as a multi-admin user, you can enable the services tab for other users, otherwise, you cannot.
In Parameters, we can define security standards for the user regarding passwords and login.
For more information on the mentioned parameters, access the links:
* - Password Reset
** - Session Timeout
*** - Two-Factor Authentication
We have a level of granularity that applies parameter configuration hierarchically, with the configuration prioritized as USER → GROUP → SYSTEM.
There are 4 main profile types:
Analysts: Participate in Workflow, use Data Entry, and view reports;
Managers: Manage the T6 solution, modeling, form creation, and security management. Managers have access to all modules, but not all functionalities inside them. Full functionality access is restricted to administrators;
Administrators: Manage environment, infrastructure, and data load routines, and have full access to modules and application data;
Planners: Focus on data entry and analysis, with access to forms, reports, and dashboards.
To create users in T6, the following functionalities must be enabled:
Administrator: Manage application security (full) (multi-app) and Manage system users;
Manager: Manage Application Security.
The required fields for user creation, marked with *, are:
Login
First Name
Last Name
Licensed Planning Profile
Licensed Consolidation Profile
Email
Password
Confirm Password
To force a user to change their password on the next login attempt, select the checkbox Force password change on the next login of this user while creating or editing the user.
To add a user to a group, follow these steps:
In user permissions, the following options are available:
Read-Only: The user can only view data, without editing permission;
Read-Write: The user can view and edit data.
User impersonation allows you to "assume" another user's identity to view shared data and objects.
To use user impersonation, follow these steps:
Services allow external API connections without using the interface or a logged-in user. They are useful for server-to-server integrations using authentication tokens.
To add services in user permissions, follow these steps:
A user can only be removed if they are not associated with any task as Planner, Data Reporting Responsible, or Reviewer, and are also not associated with any group.
To view and manage the Services tab, the user must have the multi-admin role.