The power of SecureSheet is that it can be used by multiple people around the world, anytime, anywhere. It is a living, real-time application available to anyone who has a web browser – and who has permission to use it.

When considering user access to SecureSheet, there are two keys that control their permission to get in and what views they see:

    1. Maintaining the Users tab in your Users-Views SecureSheet. Without a "row" in the Users tab with their email address, an end user cannot get into a SecureSheet even if they are shared to it. The Users tab is the actual security cross reference for a SecureSheet.
    2. Setting up their Sharing profile in the SecureSheet(s) they need permission to access. Sharing identifies what type of permission they are granted (e.g., Administrator, Update, View Only) and what Views they can see. If they are not shared to any views in a SecureSheet, but are in the Users tab, they will not see any SecureSheets when they login.

Users may also be set up to act as an impersonator of another user in the organization.  For example, a higher level manager may delegate data entry to a support administrator.  SecureSheet administrators can set up and impersonation list for end users to accomplish this.

These are the main tasks you perform to manage users:


Video Resources: