User role permissions: Descriptions
The following list provides a brief description of each permission setting. If you have questions during your initial system configuration, consult with your services representative for additional information about each permission setting. The permissions are organized by function.
This information appears in the IEE Configuration Guide and in the Rich Client Help. To view the permission definitions in the Rich Client Help, click the category name to expand the descriptions.
-
AMI Billing Export. Allows the user to access the AMI Billing Export window. Required to call the Billing Export Web service.
-
AMI Billing Export Queue Administration. Allows the user to administer the AMI Billing Export queue.
-
AMI Cancel Operation. Allows the user to cancel a pending two-way controls operations in AMI Communications.
-
AMI Change Program. Allows the user to change the program of an AMI meter.
-
AMI Connect Disconnect. Allows the user to perform connect / disconnect AMI functionality on the AMI workbench.
-
AMI Contingency Read. Allows the user to perform a contingency read of an AMI meter.
-
AMI Contingency Read By Device List. Allows the user to perform a contingency read for multiple devices.
-
AMI Contingency Read Monitor. Allows the user to access the contingency read monitor.
-
AMI Data Export Create Request. Allows the user to create AMI Data Export Requests.
-
AMI Data Export Edit Request. Allows the user to modify existing AMI Data Export Requests.
-
AMI Data Export View Request. Displays the AMI Data Export feature on the AMI workbench for user access.
-
AMI Data Export View Trend. Displays the AMI Data Export Trend feature on the AMI workbench for user access.
-
AMI Interactive Communications. Allows the user to perform an interactive communication with an AMI meter.
-
AMI Interrogation By Device. Allows the user to perform AMI remote interrogation by device.
-
AMI Interrogation By Group. Allows the user to perform AMI remote interrogation by group.
-
AMI Readings Import. Allows the user to access the AMI Readings Import window.
-
AMI Remote Interrogation. Allows the user to perform AMI remote interrogation.
-
AMI Summary. Allows the user to access the AMI Summary window.
-
AMI View Communications Log. Allows a user to view the AMI Communications log.
-
HHF File Imports. Allows a user to perform HHF file imports.
-
RemoteDisconnect. Allows the user to perform a remote disconnect or reconnect to meters with appropriate hardware.
-
RemoteInterrogation. Allows a user to perform Remote Interrogations on a Service Mode meter/endpoint.
-
RemoteInterrogationQueue. Allows the user to access the Remote Interrogation Queue for a Service Mode meter/endpoint.
-
Administer User Security. Allows the user to setup up roles and identities for users.
-
Aggregation. Allows a user to perform aggregations.
-
Change Customer Configuration. Allows the user to change customer configuration.
-
Create Rates. Allows the user to create rates.
-
Delete Customer Configuration. Allows the user to delete customer configuration.
-
Delete Rate Schedules. Allows a user to delete Rate Schedules.
-
Disable Rate Tracking. Allows a user to disable rate tracking.
-
Edit Audit Log Mode Setting. Allows user to edit audit log mode setting.
-
Edit Bill Item Class. Allows the user to edit bill item classes.
-
Edit Class Category. Allows the user to edit class categories.
-
Edit CSI Code Tables. Allows a user to edit CSI code tables.
-
Edit CSI Requests. Allows the user to edit CSI Requests.
-
Edit CSI Status Code Map. Allows the user to edit CSI Reading Code Map.
-
Edit Curtailment Events. Allows the user to edit curtailment event data.
-
Edit Customer Configuration. Allows the user to edit customer configuration data.
-
Edit Customer Configuration Limited. Allows the user to edit UDAs in the customer configuration data. All parts of program based configuration windows are read only, except for UDAs.
-
Edit Entity Groups. Allows a user to edit entity groups.
-
Edit Peak Events for What If Report. Allows a user to edit Peak Events for What If reports (not curtailment related).
-
Edit Printers. Allows user to edit printers.
-
Edit Program Configuration. Allows the user to edit program configuration data.
-
Edit Rate Assignments. Allows the user to edit rate assignments.
-
Edit Rate Engine Scripts. Allows the user to access and modify rate engine scripts.
-
Edit Rate Schedules. Allows the user to edit rate schedules.
-
Edit Real Time Price Assignments. Allows the user to access and modify real time price assignments.
-
Edit Stored Formula Channels. Allows the user to edit stored formula channels.
-
Edit System Configuration. Allows the user to edit system configuration data.
-
Edit System Settings. Allows the user to edit System Settings and Code Tables.
-
Edit Task Runners. Allows the user to edit task runners.
-
Edit Task Templates. Allows the user to edit task templates.
-
Edit Time of Use Definitions. Allows the user to edit time of use definitions.
-
Edit Unit of Measure Settings. Allows the user to edit Unit Of Measure (UOM) settings.
-
Export Rates. Allows the user to export rates.
-
Forced Password Change. Allows the user to change password without knowing previous password.
-
Modify Tasks in Task Monitor. Allows the user to modify the tasks in the task monitor.
-
Password Policy Change. Allows the user to change password policy.
-
Use Advanced Formula Builder. Allows the user to use the advanced formula builder.
-
Use Basic Formula Builder. Allows the user to use the basic formula builder.
-
Access Editing and Estimation. Allows the user to access editing and estimation.
-
Edit Register Reads. Allow the user to edit register reads.
-
View Editing and Estimation Log. Allows a user to view editing and estimation log.
-
Event Code Mappings. Allows the user to access and modify event code mappings.
-
Event Export. Allows the user to run event exports.
-
Event Filters. Allows the user to access and modify event filters.
-
Event Reports. Allows the user to run event reports.
-
Access Exports. Allows a user to export data.
-
Custom SQL Export.
-
File List and Delete. Allows a user to generate file lists and delete lists.
-
Failed Import Queue. Allows a user to access import failure queue.
-
Import Customer Configuration. Allows the user to import customer configuration data.
-
Import Rate Schedules. Allows the user to import rate schedules.
-
Import Reading. Allows the user to import register and interval readings.
-
Manually resubmit Banked Data. Allows the user to manually submit IDM Banked Data Queue items.
-
View Banked Data Queue. Allows the user to view the IDM Banked Data Queue.
-
Analytical Reports. Allows user to create analytical reports.
-
Configuration Reports. Allows a user to access the configuration reports.
-
Custom Report. Allows the user to access the custom reports.
-
Operational Reports. Allows the user to create analytical reports.
-
Administer Revenue Protection. Enables the functionality of a Revenue Investigation System Administrator.
-
Investigate Revenue Protection. Enables the functionality of a Revenue Investigator
-
Manage Revenue Protection. Enables the functionality of a Revenue Investigation Manager.
-
Data Driven Schedules. Allows user to maintain data driven schedules.
-
Edit Schedule End Times. Allows user to maintain schedule end times.
-
Recurring Schedules. Allows user to maintain recurring schedules.
-
Edit Settings. Allows the user to edit service order settings.
-
View Service Orders. Allows the user to view service orders.
-
Custom Task. Allows the user to create custom tasks.
-
Edit Task Filters. Allows the user to edit and create task filters.
-
Orchestration. Allows the user to access Orchestration.
-
Server Configuration. Allows a user to access the server configuration window.
-
Task API. Allows the user access to the Task API.
-
Task Scheduling. Allows a user to access the generic task scheduling window.
-
Manual Validation. Allows a user to perform manual validation.
-
Validation Log. Allows a user to view validation log.
-
Validation Queue. Allows a user to access validation queue.
-
Validation Sets. Allows a user to manipulate validation sets.
-
Validation Work Queue Admin. Allows the user to perform administration operations on validation work queue items. Such as, assigning unassigned queue items to themselves, bulk assigning unassigned queue items, manually accept a single queue, and reassign queue items in bulk.
-
Bypass Data Security. Allows the user to view all data regardless of security group membership.
-
Interactive Graphing. Allows the user to access the interactive graphing window.
-
View Audit Log. Allows the user to view audit logs.
-
View CSI Code Tables. Allows a user to view CSI code tables.
-
View CSI Reports. Allows the user to run CSI reports.
-
View CSI Requests. Allows the user to view CSI Requests.
-
View CSI Status Code Map. Allows the user to view CSI Reading Code Map.
-
View Curtailment Events. Allows the user to view curtailment event data.
-
View Customer Configuration. Allows the user to view configuration data.
-
View Device Events. Allows the user to view device events.
-
View Peak Events for What If Report. Allows the user to view Peak Events.
-
View Printers. Allows the user to view printers.
-
View Program Configuration. Allows the user to view program configuration data.
-
View Rate Engine Scripts. Allows the user to access and view rate engine scripts.
-
View Rate Schedules. Allows the user to view rate schedules.
-
View Readings. Allows the user to view readings.
-
View Real Time Price Assignments. Allows the user to access and view real time price assignments.
-
View System Configuration. Allows the user to view system configuration data.
-
View System Settings. Allows the user to view System Settings.
-
View Task Monitor. Allows the user to view tasks.
-
View Task Runners. Allows the user to view task runners.
-
View Task Templates. Allows the user to view task templates.
-
View Time of Use Definitions. Allows the user to view time of use definitions.
-
View Unit of Measure Settings. Allows the user to view UOM settings.
-
View User Security. Allows the user to view user security.