Creating security group reports

Security group reports include information about commands enabled or disabled and users in each security group. Use these reports to quickly determine which groups have access to specific actions and the users in each group. See Security commands for information about the available security options.

1. Choose Tools > Reports.

The Reports dialog box opens.

2. Click Add.

The Select Report Type dialog box opens.

3. Select Security Group and click OK.

The Add Report dialog box opens.

4. Enter a Report name.

5. Select a Public/private report option.

Public reports are shared with all users. Private reports are not shared. You may only be able to create private reports depending on your security permissions.

6. Select the security group name restriction to include only selected security groups. If you do not select this restriction, the report includes all security groups.

The Report Restriction dialog box opens.

7. Select a security group name option.

  • Is in list or is not in list indicates if the group name is included in the list of selected groups.
  • All security groups includes all groups in the report.
  • Selected security groups only includes the selected groups in the report.

8. Click OK.

The restriction is added to the report.

9. Click the Output tab.

10. Select an Output format.

Reports can be formatted in HTML, space-delimited columns, or tab-delimited columns.

11. Select a report Stylesheet.

Cascading Style Sheets (CSS) files are installed with Surround SCM to create reports with a predefined layout and design. You can customize these stylesheets or create your own. Stylesheets are stored in the StyleSheets directory in the Surround SCM application directory on the server.

12. Select a report style.

  • Comparison style report displays security groups and commands side-by-side in the same table.
You can flag commands to review later. Double-click a command in the report to add a flag. Double-click a flagged command to change the flag to a green checkmark, which indicates the setting was reviewed.
  • Detail style report displays commands for each security group in separate tables.

13. Select the information to include in the report.

  • Server security permissions includes commands enabled on the Server Security tab in the Edit Security Group dialog box.
  • Repository and branch security permissions includes commands enabled on the Repository Security and Branch Security tabs.
  • Users in the group includes users in the Users in Group list on the Users tab.

14. Click OK.

The report is added. See Running reports for information about running reports.