Online Help > Entry Types > Common Settings > Security

General Security



Access to entries is managed by permissions set on those entries. Combined together, permissions create a strong layer of security to prevent unwanted access by users of the data source. This system provide a large collection of permissions to choose from, providing great flexibility in access management.


Formerly, Security Groups were used to manage access to entries. This system has been deprecated, but is still available for




Possible values

There are four possible values that define how permissions are granted:


Default: Inherit the permission from parent folders.

Custom: Specify which users/roles that have permission. Click Select roles or users to define who has permissions.

Everyone: Grant the permission to every user.

Never: Block the permission for every user, except administrators.


For examples on using permissions, please consult the Role Based Security System topics.



Permissions - General

Permissions - General





Sets the permission mode. It must be set to Custom in order to change the permissions individually.


Allow users/roles to view and open entries.


Allow users/roles to add entries


Allow users/roles to edit entries.


Allow users/roles to delete entries.

View password

Allow users/roles to view entry password.


Allow users/roles to open entries.



Permissions - Security

Permissions - Security




Edit permissions

Allow users/roles to edit permissions.

Entry history

Allow users/roles to view and use entry history.

Password history

Allow users/roles to view the password history.



Permissions - More

Permissions - More




Remote tools

Allow users/roles to use remote tools.


Allow users/roles to use the Inventory Report tool.



Permissions - Attachments

Permissions - Attachments




View attachments

Allow users/roles to view attachments.

Add/edit/delete attachments

Allow users/roles to add/edit/delete attachments.




Permissions - Documentation

Permissions - Documentation




View documentation

Allow users/roles to view documentation.

Edit documentation

Allow users/roles to edit documentation.


Security Groups


Security groups are used to protect sessions from a subset of system users. Assign your entry to a security group to then control who has access to it and how much control they have on the entry.


Click on the arrow of the Security group box to select one of your existing security group. If you have assigned a security group to your parent folder it will be automatically inherited by all entries created under that folder, it is why, like in our example below, even if you have your security group set to None your entry will still have a security group applied to it which would be the Client Group Security Group.


Security - Permissions

Security - Permissions


Create a Security Group

Remote Desktop Manager's Security Groups are container for sessions, not for users. Folders are closely tied with Security Groups, so there's an overlap in usage. The key points are:


Security is inherited: child items and folders are covered by a parent folder's security group.

Security is additive: a security group added to a sub folder does not override the parent, it adds to it.

A folder has a single Security Group: use Shortcuts to work around that limitation.


Fore more information please consult the Security Group Management topic.