Malvern Access Configurator (Mac) User Guide: MAN0602-01-EN-00 July 2017
Malvern Access Configurator (Mac) User Guide: MAN0602-01-EN-00 July 2017
CONFIGURATOR (MAC)
USER GUIDE
MAN0602-01-EN-00 July 2017
Copyright © 2017 Malvern Instruments Ltd.
MAN0604-01-EN-00 July 2017
Malvern Instruments pursues a policy of continual improvement due to technical development. We therefore
reserve the right to deviate from information, descriptions, and specifications in this publication without
notice. Malvern Instruments shall not be liable for errors contained herein or for incidental or consequential
damages in connection with the furnishing, performance or use of this material. No reproduction or
transmission of any part of this publication is allowed without the express written permission of Malvern
Instruments Ltd.
Head office:
Malvern Instruments Ltd.
Enigma Business Park,
Grovewood Road,
Malvern,
Worcestershire WR14 1XZ
United Kingdom.
Tel + [44] (0)1684-892456
Fax + [44] (0)1684-892789
www.malvern.com
Malvern and the 'hills' logo are registered trademarks in the UK and/or other countries, and are owned by
Malvern Instruments Ltd.
OMNISEC ............................................................................................................................ 30
Permissions ...................................................................................................................................30
Kinexus .............................................................................................................................. 40
Permissions ...................................................................................................................................40
Note: commands in this guide may be different depending upon the specific software application running.
Consult your products user manual for exact details and instructions.
Selecting an application
The first task in using the MAC is to import the permissions file (permissions.xml) for the Malvern
application you wish to control. This file lists all the securable actions, such as record creation or editing,
which can be carried out with an application. In general, the permissions file for each application software
will be stored in the Program Files directory tree on the computer running the application.
Figure 2: MAC application following successful import of the permissions for the Mastersizer 3000 and MAC applications.
2. Select the permissions files required. Once these files have been successfully imported, you will see
each of the applications listed within the MAC software window (figure 2).
To initiate a scan:
1. Click on the Refresh Now option within the User and Groups Cache section of the Local Options
window. This will cause the application to find all the Windows users and groups accessible from
the computer and network on which the MAC application is stored. Note that, depending on the
size of your network, this action may take several minutes.
The default queries that are installed utilize Lightweight Directory Access Protocol (LDAP) to query the Active
Directory server to scan for users and groups. If after completing a scan no users or groups are found, this
could indicate that LDAP is not supported or enabled on your network and that a different method —
Windows Management Instrumentation (WMI) will be required to scan for users. This can be done by creating
your own query for finding users and groups.
LDAP paths can be set to target specific areas of a network to speed up scanning and can be useful if you
have a large network.
If LDAP is not supported by your network then a Windows Management Instrumentation (WMI) query can be
used to search your network as WMI is preinstalled in Windows 2000 and newer operating systems. By not
specifying the domain or server, the query will search from the root and scan the entire network for users and
groups.
Due to a limitation in the software, if you need to change a query types between LDAP or WMI; it would be
best to create a new query and delete the old one rather than editing an existing query.
Roles contain sets of permissions to perform functions. By grouping permissions to perform functions into
logical role types it is then possible to then create layers of security control within the system. For example,
• Users having the "Basic User" role might be able to run measurements, but not edit records.
• Similarly, an "Intern" role might be able to access reports, but not run measurements.
To add a role:
1. Click the Create icon within the ribbon bar. The Role Detail window will be shown (figure 7).
2. This will cause the Role Detail window to appear (figure 8), with any users or groups associated
with the role being listed on the Users and Groups tab. In figure 8, two users have already been
added to the selected role, along with one group.
3. To add new users and groups to the role, click the Add button. This will display a searchable list of
all the users and groups (figure 9) found during the network scan described above.
4. Locate the users and groups required and select to add.
5. Click Ok to confirm.
Role validity
Once the user (or group) has been added to the role, you can then configure a valid from / valid to time-
period during which the user will remain active within that role.
The period of time over which a role is active can be set within the MAC application (figure 10). This enables
roles to be created for short time periods if required, for instance to allow the completion of a specific project
by a group of users.
By default, the Valid from and Valid to dates are set as blanks, meaning that a user will immediately
become active with the role, and will remain active indefinitely.
Figure 11: Sharing the permissions associated with one role within another role. In this example, the QC User role
permissions will be inherited by the Lab manager role.
As well as being able to apply the permissions from another role to the role you are configuring, you can also
decide to share the permissions of the current role with another role within the MAC system. So, let us
assume there is a Facility Manager role, which needs to have all the capabilities of the Lab Manager role. To
set this up:
1. Access the Has These Member Roles tab within figure 12,
2. Add the Facility Manager role to the list. This will ensure that all users assigned to the Facility
Manager role will be able to access all the functions associated with the Lab Manager role.
Note: make sure the correct application is listed in the title of the Permissions From: tab before continuing.
If it is not displayed, press Cancel and then select the correct application from the Applications list.
Note: Malvern does not have a “secret role” or password to enable access if you have locked yourself out of
the system.
Note: Once the permissions file has been created, it is important that deletion of the file is prevented using
the Windows operating system file access controls. Read, write and modify access must, however, be
maintained. The file is protected against unauthorized changes using applications other than the MAC.
Unauthorized changes will therefore be detected by the host application. Appendix 2 in this document lists
the files used by the MAC and provides advice regarding how these can be secured to prevent unauthorized
changes to the MAC security and audit functions.
For the Mastersizer 3000, this is done from the Options window.
1. Select the Access Control settings and select Enable Access Control (figure 17). This can only be
carried out if you are an administrator on the computer hosting the Mastersizer 3000 software.
2. To ensure you are an administrator, you will be required to re-authenticate (1).
Enter your password and click the blue arrow icon. If authentication is successful, the Browse…
button will become active.
3. Click the Browse… button and select the access control settings file you wish to use. (2 – in this
case the Mastersizer 3000 Access control file). Clicking OK will cause the access permissions stored
in the file to be applied. This is confirmed within the status bar of the application.
A similar process needs to be followed to secure the MAC application. Select the File-Local Options menu
item. This will cause the Local Options window to appear (figure 3). From within this, click the Browse…
button within the Access Control section of the window. Using this, find the access control settings file you
saved.
Once this is loaded, security control of the MAC application will be enabled. This will be confirmed within the
status bar of the application.
Audit trail
You may also wish for all MAC activity to be recorded in an audit trail. To do this, open the Local Options
window again. Within this, there is an Audit trail section. To enable the audit system, click the Enable
button and then click OK (figure 18).
The fact that the auditing is active will be reported within the status bar of the application. Once auditing is
enabled, the audit trail provides information on any changes made to the access control and security
configuration controlled by the MAC.
For each audit entry, the type of action and the time it was performed is logged along with the user and
computer details. The column headers can be sorted to view the data. Double-clicking on an audit entry will
bring up additional information in the right-hand pane.
The Select audit trail to view button opens a file selector window where you can select another Malvern
application’s audit trail file to be displayed in the MAC.
• More details are contained in the MAC help file
Note: Appendix 2 in this document lists the files used by the MAC and provides advice regarding how these
can be secured to prevent unauthorized changes to the MAC security and audit functions.
Permissions
The security permissions that can be set for different Groups within the MAC software are detailed below.
Import permissions Import the permissions file for Usually enabled for
Files
file an application administrators only
Analyses
Delete Baseline Allow user to delete Baseline
(continued)
Auditing
Open Audit Trail Open Audit Trail Folder
Commands
Folder Location
(continued)
Permissions
The security permissions that can be set for different Groups within the MicroCal PEAQ-DSC software are
detailed below.
Maintenance
Access is normally enabled
Allows users to replace the for lab supervisors and
Replace Needle Seal
needle seal. Malvern service and support
representatives.
Enable Engineering
Enable Engineering mode.
Mode
2. Within the Security tab, click on the Advanced button. This will cause the Advanced Security
Settings to be displayed. Within this window click on the ‘Change Permissions…’ button. This will
bring up the permissions tab:
3. Clear the checkbox ‘Include inheritable permissions from this object’s parent’, shown in the
window above. If a warning is displayed Add the parent settings before changing the security
settings. This will prevent modifications to parent directories overriding the changes which are being
implemented:
4. Next, Check the ‘Replace all child object permissions…’, as shown above (figure 21). This will apply
the changes we make to permissions for all files in this directory.
2. Within the Security tab, click Advanced. This will cause the Advanced Security Settings to be
displayed. Within this window click on the ‘Change Permissions…’ button. This will bring up the
permissions tab:
3. Disable the inheritance by selecting the Disable inheritance shown in the figure above. If a
warning is displayed, select Convert the inherited permissions into explicit permissions:
This will prevent modifications to parent directories overriding the changes we are implementing.
4. Next, Check the ‘Replace all child object permissions…’ option shown above. This will apply the
changes we make to permissions for all files in this directory.
5. Select the Users group specifically for Read & execute that applies to This folder, subfolders and
files and select to Edit the permissions. This will cause the Permission Entry window to appear: