0% found this document useful (0 votes)
99 views

q3.CSS 9 Week 5

[1] There are different types of access levels that can be configured for folders including view-only access, manage access/edit access, and no access. [2] Access levels can be configured as completely open, open with restrictions, or closed/multitenant. A completely open system allows all users full access while a closed system prevents different user groups from seeing each other. [3] Setting up an access system involves planning the folder structure, configuring user groups, setting access levels for folders and subfolders, and migrating content. The level of access flows down the folder hierarchy.

Uploaded by

Ramlede Benosa
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views

q3.CSS 9 Week 5

[1] There are different types of access levels that can be configured for folders including view-only access, manage access/edit access, and no access. [2] Access levels can be configured as completely open, open with restrictions, or closed/multitenant. A completely open system allows all users full access while a closed system prevents different user groups from seeing each other. [3] Setting up an access system involves planning the folder structure, configuring user groups, setting access levels for folders and subfolders, and migrating content. The level of access flows down the folder hierarchy.

Uploaded by

Ramlede Benosa
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

LEARNING ACTIVITY SHEET

SPECIAL PROGRAM IN ICT 9


COMPUTER SYSTEMS SERVICING 9
Third Quarter, Week 5

Name of Learner: ____________________________________________________________

Grade Level /Section: __________________________ Date: __________________________

DESIGNING AND CONFIGURING A SYSTEM OF ACCESS LEVELS

BACKGROUND INFORMATION FOR LEARNERS

DEFINITION OF TERMS
1. Manage Access - the process of identifying, tracking, controlling and managing authorized
or specified users' access to a system, application or any IT instance
2. Users - a person who uses or operates something, especially a computer or other machine
3. Interface - an arrangement of intersecting horizontal and vertical lines
4. Network - a point where two systems, subjects, organizations, etc. meet and interact
5. Content Access - the ability, right, or permission to approach, enter, speak with, or use;
admittance
6. Admin - responsible for all work activities concerning communication and IT
7. Edit - a change or correction made as a result of editing
8. Restrictions - a limiting condition or measure, especially a legal on
9. Configure - look at or inspect
10. View - system refers to the arrangement of each of its functional units, according to their
nature, number and chief characteristics

TYPES OF ACCESS TO FOLDER


1. View – the user can see the existing folder and the inside of it.
2. Manage Access, Edit – it lets the user do everything that the view access level does, and
make changes to the folder such as:
a. Editing Looks and editing dashboards in the folder
b. Specifying which users and groups of users can view or manage the folder
c. Creating subfolders
d. Renaming, moving, and deleting a folder
e. Copying and moving Looks and dashboards
f. Deleting Looks and dashboards
OPEN AND CLOSED SYSTEMS OF ACCESS TO FOLDER

Level of Access to Folders Description Recommended Use


Completely Open • All users can view and • Small companies
modify all shared • Companies with open
content. policies about data
• Companies sharing
editable reports
Open with restrictions • Some shared contents • Medium-sized or
are restricted to access. larger teams and
• Only certain people company
can edit some content • Highly diversified
• Certain content is user bases where
entirely invisible to reports aren’t relevant
particular people to everybody
• Companies that want
content to be viewable
by everyone but
editable by only few
Closed • Also called • White label and SSO
multitenant embed use cases
installation • Customers host clients
• Prevents user from into the system who
different group from may be from different
knowing each other companies or group
and should not know
about each other.

CONFIGURING A COMPLETELY OPEN SYSTEM

STEP 1. Manage the setting from the Content Access section of the Admin panel.
STEP 2. Once the user has Manage Access, Edit access to a folder, they also have Manage
Access, Edit access to all content in that folder, including all subfolders under it.

CONFIGURING AN OPEN SYSTEM WITH RESTRICTIONS

STEPS IN CONFIGURING AN OPEN SYSTEM WITH RESTRICTIONS


STEP 1: Plan out your structure • Within your Shared Folder, create a
folder for a department, team, or
project. Example: Finance Team
• Give the CFO (main analyst for
Finance) the Managed Access, Edit
access in that folder. The rest of the
team will be on View access.
• Create two subfolders, one for editable
Content and one for Read-Only
content. Create another subfolder if
needed.
• In the Editable Content subfolder,
grant the Manage Access, Edit access
to the whole team for the member of its
team can have access to add, delete, or
change content in that subfolder.
• In the Read-Only subfolder, grant
View Access to the whole team. The
CFO will still be able to Manage
Access, Edit content of the folder.
• In the private subfolder, remove the
whole team completely. Only the CFO
can see or manage this folder.
STEP 2: Configure groups to provide granular • Access the individual subfolders.
access. • Make your way up to the setting access
for the whole shared folder.
• Access flows down the hierarchy of
folders. It is safest to begin by
manipulating the access to the lowest
subfolders individually.
• Move up through parent-level folders
to give then access level you want to
give and make sure that the changes
don’t conflict with the lower levels.
STEP 3: Change ALL USERS group’s access • The changes made will go into effect.
to view on the SHARED FOLDER.
STEP 4: Remove ALL USERS from any • If you decide to make the any folders to
folder you don’t want viewable by the whole be private to other subgroup, go back
company. and remove ALL USERS completely
from those folders. The folders will
now only appear for groups and users
on the list.

CONFIGURING A CLOSED SYSTEM

STEPS IN CONFIGURING A CLOSED SYSTEM


STEP 1: Plan out your structure
STEP 2: Configure groups to provide granular access
STEP 3: Enable the closed system in the Admin panel
STEP 4: Give each company group in your system View access for the Shared
folder.
STEP 5: Configure access levels for each Subfolder of the Shared folders.
STEP 6: Migrate content into subfolders.
LEARNING COMPETENCY WITH CODE
Objective No. 1 Set-up user access

DIRECTIONS/INSTRUCTIONS
Read the following statements/questions then give the answer needed.

EXERCISES/ACTIVITIES

1. Arrange the following steps in configuring a closed system. Write your answer on the box
below.

1. Plan out your structure.


2. Ask for the Closed System option.
3. Enable the closed system in the Admin panel.
4. Configure groups to provide granular access.
5. Give each company group in your system view access for the Shared folder.
6. Migrate content into subfolders.
7. Configure access levels for each subfolder of the Shared folders.

1.______________ 2.______________ 3.______________ 4.______________


________________ ________________ ________________ ________________

7.______________ 6.______________ 5.______________


________________ ________________ ________________

2. Match the words in Column A with its definition in Column B. Write the letter of your answer
on the space provided before each number.

No. Column A Column B


_______1. Manage Access A the ability, right, or permission to
approach, enter, speak with, or use;
admittance
_______2. Users B a change or correction made as a
result of editing
_______3. Interface C the process of identifying, tracking,
controlling and managing authorized
or specified users' access to a system,
application or any IT instance
_______4. Network D an arrangement of intersecting
horizontal and vertical lines
_______5. Content Access E system refers to the arrangement of
each of its functional units, according
to their nature, number and chief
characteristics
_______6. Admin F a person who uses or operates
something, especially a computer or
other machine
_______7. Edit G a limiting condition or measure,
especially a legal on
_______8. Restrictions H look at or inspect
_______9. Configure I responsible for all work activities
concerning communication and IT
_______10. View J a point where two systems, subjects,
organizations, etc. meet and interact.

3. Look for the words listed on the box on the puzzle below.

Closed system Interface


Admin panel Open system
Manage access Restriction
Edit View access
Configure Shared folder
REFLECTION:

What is the importance of giving access to the shared folder within the company?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

REFERENCES FOR LEARNERS

https://docs.looker.com/admin-options/tutorials/access-controls

Prepared by: ERRIZ S. GASPAR


Name of Writers
Noted by: LABERNE A. LADIGNON, JR
Division ICT Coordinator/ OIC EPS

Note: Practice Personal Hygiene Protocols at all times.


Please include this in All Learning Activity Sheets.
Answer Key

You might also like