Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The sharing permissions of a program and its related metadata can be adjusted in DHIS2 to ensure that users who capture and analyze data can read the metadata, but minimize the risk of unauthorized changes. The scope of users who can do data entry can be controlled by setting sharing permissions on a program and its related metadata.

...

Updating Sharing Settings

To update the sharing settings, you need to be logged in to DHIS 2 and on the Program Config App Home Screen (List of programs).

...

Info

Please note if you do not have sufficient DHIS 2 User Account Access you will not be abe to make change, you will be presented with the following message:

...

Navigating Sharing Settings

Info

Please ensure you are working on the correct Program before making changes to Sharing Settings.

...

Permission menu: You can click the ‘Permission icon’ to show the corresponding Permission menu. You can change the ‘Metadata’ and ‘Data’ permission from this menu.

Adding New Users and User Groups

To add a new User or User Group by simply click in the text area (1) and start typing where you will be presented with a list of all Users and User Groups available, click the relevant one to add.

...

You will need to add Users and User Groups one-by-one.

...

Saving Changes

You can either apply these settings just to the ‘Program Level’ or ‘Program & Program Stages’ or ‘Program, Program Stages & Data Elements’. You can click on the dropdown arrow and select the required level from the dropdown menu.

The default option is always APPLY TO PROGRAM, PROGRAM STAGES & DATA ELEMENTS. If it is a Tracker not a HNQIS 2 Program.

Merage , Append or Replace settings

...

Info

Unlike DHIS2, here you need to ‘Apply’ to save all the changes you have made.

Applying Settings

This option is only showing on HNQIS2 Program, not Tracker’s.

...

Overwrite Existing Behavior:

If this checkbox is selected, the system will remove all the other permission and replace them with the selected users/ user groups and their corresponding permissions. Whereas, if it is not selected, the users/groups will be appended with the existing list.

...