09931535B User Setup Software Guide
09931535B User Setup Software Guide
User Setup
Software Guide
Syngistix
User Setup Software Guide
Release History
Any comments about the documentation for this product should be addressed to:
User Assistance
PerkinElmer, Inc.
710 Bridgeport Avenue
Shelton, Connecticut 06484-4794
U.S.A.
Notices
The information contained in this document is subject to change without notice.
Except as specifically set forth in its terms and conditions of sale, PerkinElmer makes no warranty
of any kind with regard to this document, including, but not limited to, the implied warranties of
merchantability and fitness for a particular purpose.
PerkinElmer shall not be liable for errors contained herein for incidental consequential damages in connection
with furnishing, performance or use of this material.
Copyright Information
This document contains proprietary information that is protected by copyright.
All rights are reserved. No part of this publication may be reproduced in any form whatsoever or translated
into any language without the prior, written permission of PerkinElmer, Inc.
Trademarks
Registered names, trademarks, etc. used in this document, even when not specifically marked as such, are
protected by law.
PerkinElmer is a registered trademark of PerkinElmer, Inc.
Table of Contents
Welcome ............................................................................................................................... 9
Security .......................................................................................................................... 9
Integrity .......................................................................................................................... 9
Traceability ..................................................................................................................... 9
Using the User Setup Program ...............................................................................................11
To open the User Setup utility .........................................................................................11
Setting Up Users in the Software ............................................................................................13
Users & Groups ............................................................................................................ 15
About Users and Groups Settings ...........................................................................................17
Managing Users ....................................................................................................................18
How do I add a new user? ..............................................................................................18
How do I edit a user? .....................................................................................................18
How do I delete a user? ..................................................................................................19
How do I assign a user to a group? .................................................................................19
How do I remove a user from a group? ............................................................................19
How do I reinstate Locked Out users? ..............................................................................20
How do I disable an existing individual user? ....................................................................20
How do I set-up Windows/Domain Users instead of PerkinElmer Password Control .............20
Managing Groups ..................................................................................................................22
How do I create a new group? ........................................................................................22
How do I define what members of a group are able to do? ...............................................22
How do I edit a group? ...................................................................................................23
How do I delete a group? ................................................................................................24
How do I assign a user to a group? .................................................................................24
How do I remove a user from a group? ............................................................................24
Managing Password Settings ..................................................................................................25
To manage password settings .........................................................................................25
How do I change a Password ? ........................................................................................26
How do I define when users must change their password ? ...............................................27
How do I define the minimum length of time that users must retain the same password
before they are able to change it ? ..................................................................................27
How do I define the length of a password ? .....................................................................27
Can a password be reused ? ............................................................................................28
Do users have to enter a password ? ...............................................................................28
Is there a record of previous passwords ? ........................................................................28
How do I setup the No Passwords Login mode (Non-ES only) ? .........................................28
How do I setup Windows Login to Log in to the PerkinElmer software ? .............................30
How do I Log in to PerkinElmer software using my Windows Login ? .................................31
How do I remove a user from the PKIUsers Windows Group ? ...........................................31
Why can't I login to the PerkinElmer software using my Windows Login ? ..........................32
What should I do if I am logging into PerkinElmer software using my Windows Login and
I get a message that my password is due to expire ? ........................................................32
Login History.........................................................................................................................33
Audit Trail .............................................................................................................................34
Summary ..............................................................................................................................35
Data Folders ................................................................................................................. 37
Managing Data Folders ..........................................................................................................39
To select Users ...............................................................................................................39
To add a data folder .......................................................................................................39
To delete a data folder ....................................................................................................40
What Are the Default Storage Locations for Syngistix Data? ..............................................41
Electronic Signatures (ES only) ................................................................................... 43
Managing Electronic Signatures (ES only) ...............................................................................44
How do I add a reason for a signature point ? ..................................................................46
5
How do I edit a reason for a signature point ? ................................................................. 46
How do I delete a reason for a signature point ? .............................................................. 46
How do I reorder the reasons listed for a Signature Point ? .............................................. 46
Email Setup .................................................................................................................. 47
Managing Email .................................................................................................................... 49
To Setup Email/Text ....................................................................................................... 49
To add an email address ................................................................................................ 49
To add a text address .................................................................................................... 50
Notifications ................................................................................................................. 51
Managing Notifications .......................................................................................................... 53
Settings ........................................................................................................................ 55
Managing Settings ................................................................................................................ 57
Using the User Setup P rogram
7
8 . Syngistix User Setup Software Guide
Welcome . 9
W elcom e
The User Setup program is designed as an application tool that allows you to set Syngistix
permissions and data storage locations on a per user basis. This Help file provides you with
information on how to use the User Setup program.
The ES software provides the security and integrity your lab requires for electronic records.
System administrators can manage user access to various software functions through
configurable permissions. During routine operation, the Enhanced Security software
automatically records changes to key operational profiles such as method, mass calibration,
and conditions files and tracks system operations in the audit trail.
Some of the key features of the ES software include the following:
Security
Administrators of the Syngistix for ICP ES software and password protected database can
configure users and assign them to different groups with each group assigned a specific set
of permissions. Your ES administrator defines these groups and assigns permissions based on
the needs of your users and lab environment. Along with the use of passwords to gain access
to the software, these features permit overall access to be managed appropriately in a
regulated environment.
The system administrator can determine whether different users can normally access the
same files such as method, conditions, sample, and report files. Files are located on the
instrument computer.
I ntegrity
The ES software applies a checksum to all data files completely transparent to the user. If
someone alters the data outside of the Syngistix software, for example by altering the
analysis time or changing the concentration value, this alteration is detected by the ES
software when the file is next accessed.
The software automatically tracks version numbers for all files and moves old versions to a
database. Differences between versions can easily be reported using the File Changes mode
in ES Tools.
Every time an analysis is performed, the ES software saves a copy of all pertinent analysis
parameters with the analytical results. The data saved includes method and instrument
parameters, analytical calibrations, logged-in originator, and signing users.
Reprocessing does not change the stored data, but rather new data are written to the
dataset along with a notation that the data represent reprocessed data rather than original
data. This provides a permanent record of all results regardless of whether they are from the
initial analysis or post-analysis reprocessing.
Data archival tools are also provided in the ES software to facilitate complete and accurate
archival of data on other storage media. Once archived, the analytical data along with the
respective audit trail entries can be restored at a future date for review or audit purposes.
Traceability
Significant actions performed by the user are recorded in an audit trail and event log with the
date and time of the action, what was done, the name of the user, and the reason the action
was performed. The audit trail can be filtered by several data fields and then viewed on-
screen, printed, or archived (if set up by the administrator).
The ES software does not permit analyses to be performed without saving the resultant data.
The security features also ensure that analyses are conducted only with methods and other
10 . Syngistix User Setup Software Guide
parameter files that have been saved. These restrictions ensure that a proper audit trail is
maintained for all activities.
Using the User Setup Program . 11
2. Type in your User Name and Password (the user must have administrator privileges),
and then click OK.
The User Setup window appears.
o Email Setup
You use this page to set up email and text messages. Click here for more
information.
o Notifications
You use this page to set up notifications of Events (for example, Login Failure,
Password rest, etc) to your email address or a text message. Click here for more
information.
o Settings
You use this page to set an Application lockout time and/or Enable INconX. Click
here for more information.
On the bottom of each tab page the following buttons are available:
o - Click this question mark button for information on using this tab.
o Apply - Click this button to save all of the changes you have made.
o OK - Click this button to save all of the changes you have made and close the User
Setup application.
o Cancel - Click this button to close the User Setup application without saving
changes.
o Print - Click the Print button to print the User Setup report.
o Archive - This button is only available on the Login History, Audit Trail, and
Summary tabs.
o Export - This button is only available on the Summary tab.
Setting Up Users in the Software . 13
2. Click the Start button then navigate to PerkinElmer Syngistix for ICP, click the
down arrow to expand the listing and select User Setup.
The Syngistix Login dialog box appears.
3. At the prompt, type the User Name and Password for your Administrator account.
If this is the first time that you are logging in to the software, you are prompted to
change the password (initially set at installation). Type the new password and repeat
the same password in the Confirm Password box. Write down your new password.
4. Click OK. The User Setup dialog box appears.
5. Click Users & Groups.
The Users, Groups, Password Control, Login History, Audit Trail and Summary dialog
box appears.
6. On the Users tab, click New.
The New User dialog box appears:
• In the User Name field, type the user’s User Name or unique ID.
• In the Full Name field, type the user's full name.
• In the Password field, type 123456 to serve as an initial default password.
• In the Confirm Password field, type 123456 again, and then click OK.
7. In the Status section select Enabled or Disabled.
8. Click OK to save your entries and close the dialog.
9. In the Available groups for user list, select a group (such as Chemists), and click
Add to move the group name to the User is a member of list.
10. Click Apply to apply the setting and then click OK to close the dialog.
11. Click Data Folders.
The Data Folder window appears.
12. Click Select User and select the user’s name from the drop-down list. Click Apply, and
then click OK.
13. Close the User Setup window.
14 . Syngistix User Setup Software Guide
14. Write down the user’s name and the temporary password (123456) and give it to the
user. The user must change their password when they first log into the software.
Users & Groups
15
16 . Syngistix User Setup Software Guide
About Users and Groups Settings . 17
M anaging Users
When the software is installed, a user with administrator privileges and a group called
Administrators is already created for you. You can log in as the administrator (using the user
ID specified during installation) to create other users. You can add other users to the
Administrators group so that they can also manage your security settings.
Note: The Adm inistrators group is set up to allow for administrative tasks only, and does not
confer any specific permissions for working with the ES software.
You modify user settings from the Users tab. To access it from the User Setup window,
click Users & Groups. In the Users, Groups, Password Control and Summary dialog box,
click the Users tab. To apply the changes you make and continue working in this dialog box,
click Apply. To apply changes and close the dialog box, click OK.
Note: A user must be a member of at least one Group in order to login and use the Syngistix
application. If a user is not a member of any Group, a login attempt will fail as if the user
name or password is invalid.
Note: The Password is case-sensitive. It can consist of letters, numbers and single spaces only.
The maximum password length is 16 characters.
4. Specify whether the user is Enabled or Disabled.
You disable a user if you do not want them to use the software (for example, if they
leave your laboratory).
Note: The Enhanced Security software requires all new users to change their passwords when they
first log in. As a result, the User must change password at next login check box is selected
and unavailable.
5. When you are finished, click OK.
The new user is created and appears in the Name drop-down list.
2. If desired, change the Full name or Password (and re-enter the password in the
Confirm Password field), and specify whether or not the User must change password at
next login.
Note: ou cannot change the User name. You can specify the minimum length of passwords when
you manage password settings in the Password Control tab.
3. You can choose to enable or disable the user by clicking Enabled or Disabled.
You might disable a user if they will no longer be using the Syngistix software. For
instance, you might want to keep track of user IDs for former employees. If you enable
a previously disabled user, you must change that person's password.
Note: You cannot disable all users in the Administrator group; there must always be at least one
enabled Administrator.
4. When you are finished, click OK.
Note: It is not possible to reuse a User name that has been deleted.
Note: It is not possible to delete the Administrator from the Administrators group.
Note: When a group is added to the User is a member of list, it no longer appears in the Available
groups for user list.
Note: You cannot delete all users from the Administrator group; there must always be at least one
active Administrator.
20 . Syngistix User Setup Software Guide
Note: If you click OK rather than Edit when the list of Locked Out Users is displayed, the list is
closed and the Explorer starts. Any locked out users will remain locked out. The list will be
redisplayed each time you login until any locked out users have each been assigned a new
password.
Note: Users locked out for a specified duration can be unlocked by the administrator in the same
manner.
Note: To enable the user, select Enabled on this dialog. You must also enter and confirm a new
password when enabling a user.
Note: All user updates are recorded in the audit log in the Enhanced Security version of software.
3. Right-click to assign a password to them (or have them assign themselves one in
Account Settings) or Syngistix will not allow you to open it. Syngistix does not work with
PINs or Picture Passwords. Those are only for logging into the computer.
4. Open up User Setup with those credentials (doesn't matter which computer user you
are logged in as) and give everyone else permission. If no Administrator is assigned
already, Syngistix will ask you to assign a user name from the drop-down list.
The Users tab page is used to identify those individuals who will be able to use Syngistix. On
the Password Control tab page there are two types of Windows user Login Types
(PerkinElmer Login and Windows Login) and they are differentiated based upon how they are
authenticated by the operating system. A user can be authenticated by being a user on the
local computer, or he can be authenticated by being a domain user.
22 . Syngistix User Setup Software Guide
M anaging Groups
In the +software, Groups are categories to which users belong that give them certain
permissions. You can create, modify, and delete groups according to your policies. After
creating a user, you assign the user to one or more groups. When the software is installed,
an Administrators group is automatically created — it cannot be modified or deleted, it does
not appear on the Groups tab.
Note: It is not possible to create a new group within the Standard version of software.
1. In the User Setup window, click Users & Groups.
The Users, Groups, Password Control, Login History, Audit Trail,and Summary dialog is
displayed.
2. Click the Groups tab and click New.
A New Group dialog is displayed.
3. Enter a Group name for the group and click OK.
The new group appears and is selected in the Name drop-down list.
OR
To assign one or more (but not all) permissions, click in the box next to the
permission you wish to assign to the group.
A check mark indicates that the permission is available for the group.
For ES only: Disallowing self-review and self-approve/rejection of files and
data.
By default all check boxes are clear (unchecked) so that nothing is allowed. More
specifically, only an administrator can set to allow the following permissions for a
Group:
Managing Groups . 23
Note: When only some of the permissions are selected, the check box at the top of the tree is
grayed to indicate that not all of the options are selected - Example
Note: The numbers at the end of each permission relate to the database. When you view the audit
trail, it is these numbers that are listed rather than the description of the permission. You will
need to refer back to the list of permissions on the Groups tab to find the number that
relates to a particular permission, or look at the summary where the permission together
with the number is given.
• To select all of the permissions within a branch, click the check box beside the
parent of that branch.
• To expand a branch, click the plus sign icon. To collapse it, click the minus sign
icon.
• If you select a check box within a branch, the check box beside the parent
permission in the tree contains a gray check mark.
Note: The number that appears in square brackets after each permission is how that permission is
referenced in the audit trail. If the permission is referenced in the audit trail, it is this number
that appears, not a text description of the permission. To determine which permission is
being referenced in the Audit Trail, you must look at this list.
3. When you are finished, click OK.
Note: If you delete a user's only group, that user cannot use the ES software until you assign that
user another group. Ensure that any affected users belong to a group.
4. On the Group tab, select a group from the Name drop-down list and then click Delete.
You are prompted to confirm the deletion. If the group you are trying to delete has
users assigned to it, the confirmation dialog box informs you of this.
5. To confirm deletion click Yes.
The group disappears from the list.
Note: When a group is added to the User is a member of list, it no longer appears in the Available
groups for user list.
Note: The Password is case-sensitive. It can consist of letters, numbers and single spaces only.
The m ax im um passw ord length is 16 characters.
• Password uniqueness: Specify the number of past passwords to remember so
that the user cannot repeat recently used passwords.
• Account Lockout: Click this button. In the Account Lockout dialog box, specify
the number of failed logon attempts allowed before a user is locked out of the
system. Also, specify whether the lockout is permanent or limited to the specified
number of minutes.
• Lockout: The number of failed login attempts allowed before a user account is
locked out.
The administrator receives an email/text notification when a user reaches the
maximum number of failed login attempts.
26 . Syngistix User Setup Software Guide
• Lockout Duration: The time for which a user remains locked out.
Note: Never select a P erm anent Lockout duration for an administrator, as there is a risk that the
administrator will be locked out of the software indefinitely. If the administrator forgets the
password and is locked out, contact PerkinElmer service.
4. To apply the changes you make and continue working in this dialog box, click Apply.
To apply changes and close the dialog box, click OK.
Note: The settings on this tab apply to all users. You cannot define different password control
settings for different users or groups.
2. Enter the new Password and repeat it in the Confirm password entry field.
3. Click OK.
The new password is implemented. The next time the user logs in they will be forced to
change their password if you are using the Enhanced Security version of software. In
the Standard version of software, the user will only be forced to change their password
if User must change password at next login has been selected.
Note: If you have the Standard version of software, you will be unable to change the default
passwords accessed via the Login dialog for the first day after installation. If you attempt to
change a password, the following message is displayed: 'You have changed your password
less than 1 days ago. You cannot change your password again'. This is due to the default
Managing Password Settings . 27
setting for M inim um passw ord age, where Allow changes after (days) is set to 1. If
you wish to change the password within the first day, the Administrator must select the
Allow Changes I m m ediately option on the Password Control tab of the Users, Groups,
Signatures and Password Control dialog.
Note: If you want to set the Maximum password age to 1 day the Minimum password age must
first be set to Allow changes immediately.
If it is not necessary for users to change their password, select Password never expires.
Within the ES version of the software users are forced to change their password the very first
time they login.
Note: If you want to set the Maximum password age to 1 day the Minimum password age must
first be set to Allow changes immediately.
Within the ES version of the software, users will be forced to change their password the very
first time they login.
Within the Standard Security version of the software, select Change Password at First
Login to force users to change their password the very first time they login.
Note: A second blank password cannot be used immediately when a blank password expires if
Num ber of passw ords to rem em ber has been selected in the Password uniqueness
section of the Password Control tab.
Note: Allow blank passw ord is not available within the Enhanced Security (ES) version of the
software.
Note: Do not keep passw ord history is not available in the Enhanced Security version of
software.
When in the No Passwords Login mode, the login window contains a Hide login upon
initialization check box that when checked, hides the login window upon initialization of the
application (i.e., Syngistix main app, Offline, and Data Manager).
• Once this feature is set, when logging in to Syngistix, a user checks the Hide login
upon initialization check box and logs in. Upon the next initialization, Syngistix will
login using the last logged in user.
• To change back to show the login upon initialization, in the ball menu of
Syngistix, there is a menu item: "Show Login". Once selected, the login window
with the check box for hide login will be shown. A user can then uncheck the box
and login. Upon next initialization of Syngistix will show the login screen.
Note: This setting does not apply to the Installer, Reconfigure, User Setup, and Switch User;
therefore, a user will not see the check box.
30 . Syngistix User Setup Software Guide
Note: It is possible to add a user more than once if they are on more than one domain as each
Location together with the user name and Password will be unique.
All users added to the PKIUsers Group will now be able to log in to PerkinElmer software
once the software Administrator has defined the Login Type as Windows Login (as described
below):
Note: The Login Type (Windows Login, PerkinElmer Login or No Passwords Login (Standard version
only)) applies to all users. It is not possible to have some users that log in using their
Windows Login while others use a separate software login.
13. From the Start menu select the required software application.
14. Log in as an Administrator.
15. From the Tools menu select Administration and then select Setup Users and Groups.
The Users, Groups, Password Control, Login History, Audit Trail, and Summary dialog is
displayed.
16. Select the Password Control tab.
17. From the Login Type drop-down list select Windows Login.
All the other information previously displayed on the tab is removed as the password
Managing Password Settings . 31
controls are from Windows rather than the software application. The Windows users
will be loaded and you may be prompted to select a new Administrator.
Users must then be added to the required software application group:
18. Select the user from the Name drop-down list on the User tab.
19. Select the Group from the list of Available groups for user and then click Add.
The Group is added to the User is a member of list.
20. Click OK to close the The Users, Groups, Password Control, Login History, Audit Trail,
and Summary dialog is displayed and apply the changes.
Note: When using the Windows Login, at least one user must be assigned Administrator rights. If
not, it will not be possible to exit the software. If a user is not added to at least one group,
an error message will be displayed when they try to log in informing them that they do not
have access to the application.
Note: During the installation of the PerkinElmer software, PE21CFR server, 21CFR_Admin group
and 21cfr admin user are installed. PE21CFR server needs to run under Windows admin
authority. By default it uses the 21cfr admin user for this. You can change which user is
used to run PE21CFR using the PE21CFR configuration program (config21cfr.exe) which can
be found under C:\Program Files\PerkinElmer\PE21CFR. Running config21cfr.exe displays the
Enhanced Security Configuration dialog. Select the Security Server tab and change the
Account Name. Click Save and Close for the new Account Name to be activated. For further
information about the Enhanced Security Settings, see Enhanced Security Settings.
Note: If all users are on the same Domain, there is no need to show the Log on to field as the
correct Domain will be listed. It may avoid confusion to users if this field is hidden. If the Log
on to field is shown, click Options<< to hide it.
7. To remove a member (user) from the Group, select the required member and then click
Remove.
The user is removed from the Group.
Why are the Users I have added to the PKIUsers Group for the Windows Login not displayed
on the Users tab of the Users, Groups, Password Control, Login History, Audit Trail and
Summary dialog?
Any users added to the PKIUsers Group before logging into the PerkinElmer software for the
first time will appear in the Name drop-down list on the Users tab of the Users, Groups and
Password Control dialog. If users are subsequently added, you must click Refresh Users on
the Users tab for the list to update.
Note: The Administration Audit Trail records all changes to security settings in compliance with 21
CFR Part 11. All changes to users, groups, password settings and signature points are
recorded.
Login History . 33
Login History
1. In the User Setup dialog box, double-click Users & Groups. The Users, Groups,
Password Control, Login History, Audit Trail, and Summary dialog box appears.
2. Select the Login History tab to display a history list of users attempting to login, along
with the following information:
Note: The Login History can only be viewed by users who are members of the administration
group.
• Full Name - the full name of the user.
• User Name or ID - the login user name of the user.
• Computer - the name/ID of the computer used.
• Status - OK indicates that the user logged in with the correct password,
Failed indicates that a login was attempted with an incorrect password.
• Logged In - the date and time when they logged in.
• Logged Out - the date and time when they logged out.
Note: If a non-existent User Nam e is entered during login a failed login attempt is recorded. Not
Found is entered in the Full Nam e field of the Login History, and the incorrectly entered
User Nam e is also recorded.
Audit Trail
The software provides the Security audit trail which is a history of login attempts and an
audit trail of actions performed in the ES Setup applications. It records all changes to security
settings in compliance with 21 CFR Part 11. All changes to users, groups, password settings,
login history and signature points are recorded. It also records when the Login History or
Audit Trail have been exported and cleared.
Note: When permissions are added or deleted for a particular group, the Audit trail entry is a
number rather than the full permission name. To relate the number to a permission, select
Setup Users and Groups from the Administration menu and then select the Groups tab. Each
of the permissions listed has the related number against it. The permission and associated
number are also displayed in the summary
Print button: Click this button to print the contents of the current tab.
Archive button: Click this button to export the contents of the current tab to a comma-
separated (CSV) or raw text file.
The Audit Trail items will be exported to a CSV file, then removed.
Summary . 35
Sum m ary
In the software, whenever you want to review your user, group, and password settings in
one summary report, you can view the Summary tab. To access it from the User Setup
window, click Users & Groups. In the Users, Groups, Password Control, Login History, Audit
Trail, and Summary dialog box, click the Summary tab.
37
38 . Syngistix User Setup Software Guide
Managing Data Folders . 39
To select Users
You can select All Users to have access to the Data Folders or Select user (then select a
user from the drop-down list) to have access to the Data Folders.
4. Click the Make new folder button and type the folder name.
5. Click OK to close the Browse for Folder dialog.
6. Click Apply to close the Data Folders dialog.
I m portant: If you Browse For a Folder and delete it, if you click the Defaults button it will bring
back the folder but not the files that were in that folder.
Note: If you delete a default folder, the software will add that default folder back automatically
when you reset the base path; however, user data that were under that folder remain
deleted.
1. From the User Setup window, click Data Folders.
4. Select the folder then press the Delete key on your keypad (or right-click and select
Delete from the pop-up menu).
5. Click OK to close the Browse for Folder dialog.
6. Click Apply to close the Data Folders dialog.
43
44 . Syngistix User Setup Software Guide
The user must supply their user name and password to apply their signature. For the first
signature during a given session, both name and password require user entry. For
subsequent signatures during the same session the User name is pre-populated based on
last user name entered and only password entry is required to implement. A session lasts
until the user logs out, or until a preset amount of time has been reached as determined by
the Administrator. The original user is allowed to remain logged in to the application while
another user applies a signature. The person signing may be different from the person
currently logged in and using Syngistix at the bench. The two users may have different
permission levels within the application.
Electronic signatures are required for critical operations, such as those operations which
cause data to be collected, administer security, or cause modifications to protected files.
What is an electronic signature ?
An electronic signature as defined by 21 CFR Part 11 means a computer data compilation of
any symbol or series of symbols executed, adopted, or authorized by an individual to be the
legally binding equivalent of the individual's handwritten signature.
What is a signature point ?
A Signature Point is a point in the software that requires a signature. The Signature Points
are pre-defined. The user has to enter their User name, Password (if this option has been
selected) and Reason for saving the method. They may also be able to add additional
Comments if this option has previously been selected by the Administrator.
Managing Electronic Signatures (ES only) . 45
5. Make you selection for Require Signature and Prompt For Comments then click
OK.
6. When done click Apply or click OK to save your entries and exit the dialog.
47
48 . Syngistix User Setup Software Guide
Managing Email . 49
M anaging Em ail
From the User Setup window, click Email Setup, the Email/Text dialog appears. Here you
add or modify Email settings from the Email Setup button.
Note: When updating an Email address in this User Setup application, the main Syngistix
application reads it as a new Email so you will need to re-select it under Notifications. Always
make sure to try a test Email first.
6. Click OK when done. The address appears in the Email/Text Setup dialog.
N otifications
51
52 . Syngistix User Setup Software Guide
Managing Notifications . 53
M anaging N otifications
In the ES and non-ES software, Event Notifications are used to notify a person or persons
by email or text message about an event. Some examples that trigger events can be;
maximum number of failed login attempts reached or password reset, as well as those listed
in the main application.
The Emails listed are those set in the Email Setup dialog.
To add or remove Email addresses click the Email Setup button, select the address to be
removed,then click Remove. The Event Log captures that an email was sent.
54 . Syngistix User Setup Software Guide
Settings
55
56 . Syngistix User Setup Software Guide
Managing Settings . 57
M anaging Settings
From the User Setup window, click Settings, the Settings dialog appears. Here you set an
application Lockout Time, Enable Remote Access (non-ES only), turning watermark for an
uncontrolled document on or off (ES only).