How security works
Studies, clinical data models, transformations, and validation checks are all objects. Users are allowed to perform an operation on an object when they:
-
Belong to a user group that is assigned to the object either explicitly or by inheritance. For information on inheritance, see Object ownership.
-
Are assigned to a role within that user group that allows the operation on the object.
-
Have an application role that allows access to the required part of the user interface.
-
To either view blinded data or to unblind data, both an object privilege and an application role are required.
Parent topic: User management