Summary

This article covers the many miscellaneous functions within Enterprise Manager including password policies, information flows, billing reports, and session timeout.

Table of Contents


There are several miscellaneous functions within Enterprise Manager that help regulate the enterprise’s information flow and users.

Password Policies

Password Policies can be enacted for the enterprise and all of its associated users. To change existing policies, the user must have the Admin role for the Enterprise Manager being changed and be an administrator of the workgroup that contains it. The password policy has the following four attributes.

  • Password Aging Interval – The number of days until the user’s password expires
  • Password Blocking Interval – The number of days a password is blocked (until it can be used again)
  • Max Number of Break In Attempts – The number of unsuccessful login attempts before the user’s account is locked
  • Minimum Number of Password Changes before Reuse – The number of times a password must be unique before it can be used again

Initiate the Edit Policy Process

  1. In Enterprise Manager, locate the workgroup with the policy that needs to be changed.
  2. In the Enterprise Manager tree, right-click on the top-level workgroup name.
    A pop-up menu will appear
  3. In the pop-up menu, select ‘Create or Edit Password Policy.’

Complete Edit Password Policy Form

  1. Based on the definitions of password policy attributes, complete the ‘Edit Password Policy’ form.
  2. Click the ‘Save’ button.

If no password policy is set for the enterprise, the system works its way up the tree to find an enacted password policy and imposes those attribute settings on the enterprise. If no enacted password policies are found, then no restrictions are posed on the enterprise’s users.

Information Flows

Information stored within the Calendar, Contact Directory and File Manager can flow down from the parent workgroup to the child workgroup, can flow up from the child workgroup to the parent workgroup or can not be shared at all. This feature, if turned on, allows for efficiencies in document storage as well as improved communication between workgroup members. Depending on your access to Enterprise Manager, you will have the ability to manage information flows, view information flows or both.

When viewing or managing information flows, a red arrow indicates the directional flow of information. A red ‘X’ indicates that there is no information flow.

View Information Flows

  1. In Enterprise Manager, locate the workgroup for which you want to view information flows.
  2. In the Enterprise Manager tree, right-click on the workgroup name.
    A pop-up menu will appear
  3. In the pop-up menu, select ‘View Information Flows.’
Note: Only children workgroups can display information flows.


The View Information Flow screen will display the tools for which membership or sharing has been granted.

Manage Information Flows

  1. In Enterprise Manager, locate the workgroup for which you want to view information flows.
  2. In the Enterprise Manager tree, right-click on the workgroup name.
    • A pop-up menu will appear
  3. In the pop-up menu, select ‘Manage Information Flows.’
Note: Only children workgroups can display information flows.


The Manage Information Flow screen will display the tools for which membership or sharing has been granted.

  1. Click the arrows and X’s to change the information flow until the appropriate icon information flow is selected.
  2. Click the ‘Save’ button to save the changes and return to the Workgroup Details screen.

Billing Reports

This utility allows the user to track datapoints and user role counts across sites in a study. This feature may be useful in a range of situations, but is most commonly used in the case of billing activities.

Accessing Billing Reports

  1. In Enterprise Manager, locate the workgroup for which you wish to execute a billing report.
  2. In the Enterprise Manager tree, right-click on the workgroup name.
    A pop-up menu will appear
  3. In the pop-up menu, select ‘Search’. This will take you to the search page.
  4. At the top of the page click the ‘Search Tools’ tab. This will take you to a listing of sites in your study.
  5. Check the boxes by the sites you wish to conducted a billing report for, and then click the ‘Get Usage’ tab at the top of the screen. Optionally, you may run reports on individual sites by clicking their corresponding icons located under the “Usage” column in the table.

Running/Exporting Billing Reports

  1. The above steps should take you to a billing report configuration screen.
  2. From here you may choose from a variety of inclusion and exclusion criteria to change what is displayed in your report.
  3. When you are done, click calculate and the manager will execute the report.
  4. Once you have your results you may click the Export button (found next to the Calculate button) to generate an Excel copy of your report.

Session Timeout

Although not configurable, the Session Timeout is important piece of Enterprise security and could be considered related to the Password Policy. If a user is idle on the website for 30 minutes or more, they will be asked to log in again the next time they perform an action. This is a safeguard for when a user leaves their workstation unattended and does not log out manually.

The Fountayn platform has four distinct servers a user can visit: design, test, approve, and production. Each has a separate 30 minute Session Timeout mechanism.


Need more help?

Please visit the Fountayn Contact Information page.