Articles in this section
Category / Section

How to add the test user in the Bold BI server?

Published:

Adding a Test User to Bold BI Server

When setting up a test environment or needing to grant access to a new user on the Bold BI server, it’s important to ensure that the user is added correctly and has the necessary permissions to perform their tasks. This article will guide you through the process of adding a test user to the Bold BI server.

Step 1: Add a New User

To begin, you need to create a new user account on your Bold BI site. You can do this by following the steps outlined in the official documentation:

  1. Navigate to the “Users” section of your Bold BI.
  2. Select the option to “Add User.”
  3. Enter the required details for the new user, such as email address and password.
  4. Save the new user details.

For detailed instructions, please refer to the Add Individual Users section in the Bold BI documentation.

Step 2: Assign User to a Group

After creating the user, the next step is to assign the user to the appropriate group with the necessary permissions. This could be the system administrator group or any other group that aligns with the level of access required.

  1. Go back to the “Users” section.
  2. Find the newly created user in the list of users.
  3. Assign the user to the system administrator group or another relevant group by following the instructions provided.

For more information on how to assign users to groups, please visit the Assign Users to Group section in the Bold BI documentation.

Step 3: Share User Credentials

Once the user has been added and assigned to the correct group, make sure to keep a record of the email address and password that were set for the account. These credentials will be used for logging into the site and should be shared securely with the relevant ticket.

By following these steps, you can successfully add a test user to your Bold BI server and ensure they have the appropriate permissions to access the necessary dashboards and data sources. Always remember to manage user access carefully to maintain the security and integrity of your data.

Additional References

Was this article useful?
Like
Dislike
Help us improve this page
Please provide feedback or comments
SM
Written by Siranjeevi Murugan
Updated:
Comments (0)
Please  to leave a comment
Access denied
Access denied