Managing Local Users
Users and programs must successfully log in to the Xpress Insight 5 Server with an authenticated set of user credentials before using the system or making requests to the server.
Authorities
Certain authorities are required to invoke actions by the Xpress Insight 5 Server. See Reviewing Preconfigured System Authorities for a full list of pre-configured system authorities and the actions they authorize.
App Authorities are created when an app is imported into Xpress Insight. The app will declare any authorities it requires as custom authorities that will be created in Xpress Insight when the app is imported. These must then be assigned to Authority Groups by the Administrator.
User accounts are associated with one or more authority groups. See Using the Predefined Authority Groups and Users for further information about predefined authority groups.
![]() |
Note: There must be at least one active user with the
SYS_USER authority within the application at any one time. If an action is performed that results in there being no active
SYS_USER , an error is displayed indicating that the requested action cannot be performed. Examples of this type of action include removing
SYS_USER from an authority group or removing an authority group assigned to a user.
|
Authority to Submit and View Status of a Compute Job
compute app/APP_ALL
authority group and have either of the following authorities to submit a compute job :
SCENARIO_NEW
SCENARIO_EXECUTE
SCENARIO_READ
© 2001-2022 Fair Isaac Corporation. All rights reserved. This documentation is the property of Fair Isaac Corporation (“FICO”). Receipt or possession of this documentation does not convey rights to disclose, reproduce, make derivative works, use, or allow others to use it except solely for internal evaluation purposes to determine whether to purchase a license to the software described in this documentation, or as otherwise set forth in a written software license agreement between you and FICO (or a FICO affiliate). Use of this documentation and the software described in it must conform strictly to the foregoing permitted uses, and no other use is permitted.