Associates Inc. - Providing EHS Software Solutions Since 1979
DataPipe In Depth FAQs
Customer Support Contact
How does the system deal with security and
permissions? How do you control who sees
and who has access to forms, reports and
even specific data? Can you set up role
based security? What type of user
authentication will DataPipe use (i.e.
Windows Authentication, LDAP, Active
addition to any security mechanisms your
organization has implemented, DataPipe
has its own built in security. Users, or
groups of users, are given permission to
forms, reports, data and other sensitive
areas of DataPipe. Whomever you assign
to administer DataPipe has control over
what users see and what they can do. In
addition, you may also control what they
can do within the database. Some user
may be allowed to see only certain sets
of data. So while two users could in
fact be looking at the same
form/database, they each may have unique
views. There are many levels of security
and protection within DataPipe. How
strongly you want to enforce them is up
to you. Restrictions are controlled via
roll-based security. You can set up as
many rolls or groups as you want.
DataPipe will use windows
authentication, LDAP, Active Directory
or other authentication security
protocols to access the system, if you
TABLE OF CONTENTS
What is DataPipe?
About Knorr Associates Inc.
DataPipe - The Big Picture
is Unique in its field
Why do you need EH&S software?
Cost benefit analysis
p8: Ten Topics for Assessing EH&S Software
p19: Technical Overview
Flexibility and Customization
Towards a Purchase
Review the Complete Module List
Estimate the Number of Concurrent Users
License and Maintenance
Ongoing Support, Upgrades, Add-Ons and Additional Services
Add-ons and Additional Services
What Does this Mean?
What You Should Do
Access our system and see
DataPipe live as we move through various forms and
Copyright Knorr Associates Inc. 1979 - 2013.
Associates is a service-disabled veteran-owned small business