Welcome to the Veson Nautical Knowledge Base. In the Help Center, you can view the same articles and contact support as needed.

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 23 Current »

Home > Data Center > Security

🔑 This is a Key Topic, with high value for all users.


Only users configured as Veson IMOS Platform (VIP) Security Administrators can perform the actions described in this article.

Security is designed to protect data and prevent unauthorized access to the VIP environment used by your organization, and it manages all user rights on the system. For each user and/or group, you can assign rights to perform the functions related to each module and object.

Setting Up Security for Individual Users and Groups

To set up Security:

  1. Do one of the following:

    • On the main menu , under Data Center, click Security.

    • In the Data Center quick links, click .

    The Security List appears.


    As with any other list, you can search, select, adjust, pin, filter, group, and sort columns, reset to the default view, save user views, and export.

  2. On the Security List, you can do any of the following:

    1. Create groups and assign module and object rights.

    2. Create users.

      1. Assign users to groups.

      2. Assign user module and object rights or adjust user rights inherited from groups.


      Note: We recommend that you create groups and assign rights to them before you create individual users. You might find it more efficient to categorize users in groups and then adjust rights for individuals rather than starting from scratch for each user. 

      Creating groups and creating users are nearly identical tasks, with nearly the same panel tabs:

      • Profile:

        • Group or User Details

        • Authentication (for users only)

        • Members or Group Membership

      • Access Rights:

        • Module Rights

        • Object Rights 

Once these steps are complete, users can use their credentials to sign in to Veslink.com. If their credentials are verified, VIP starts.

On the Security List, you can also editinactivate or activate a group or user.

Note: With configuration flag CFGEnableDistributionLists enabled, you can also create Distribution Lists for reports.

Bulk Updating the Security List

To bulk update, select the users or groups you want to update and then click the action link at the top of the list (either Activate or Deactivate). To select multiple consecutive rows, select the first row and then press and hold Shift. Select the last row and then release Shift.

VIP System Audit Report

It is now possible to track all security changes made by System Administrators in VIP. Please contact Veson Support to download the report.

User/Group Report

A report icon is available in the Security List. When clicked, a drop-down list will appear. Choose the ‘User/Group Report’ option to replicate the one available in IMOS.

When the ‘User/Group Report’ line is selected, an overlay will appear. To obtain a copy of this report, you can select from several export options: Excel, PDF, and Email.

  • No labels