Named User FAQ

From wiki.olisystems.com
Revision as of 14:41, 3 January 2024 by Jberthold (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Frequently Asked Questions (FAQ) about OLI's Named User license model.

Named user administration

How will OLI track Named Users?
When you agree to license OLI Software, you will designate an administrator within your organization, this is the person who manages the OLI software access for the company. You can have more than one administrator if you desire.
The administrator is granted access to the App Manager where the software users are entered and enabled. The App Manager is used to enter, display named users, and manage each user’s OLI Software access.
How do I add a Named user to my list?
Your administrator can add new users at any time during your lease from the User Roles page of the App Manager. The user can be activated and deactivated according to your organization’s needs. To prevent abuse, changes to a user’s active status are limited to once per day and password sharing is prohibited.
Can a new user try the software without impacting our named user list?
You can add and remove access to a new user using the App Manager if you have a seat in that software available. Your total seats and available seats are displayed in the App Manager in the Contract Roles screen. Activating a user removes the seat from your seat count, deactivating a user returns the seat so that it is re-assignable.
A few of our users access the software infrequently (once or twice a year). I would like to toggle this user on and off as needed. Will this be possible?
Infrequent users should be included in your named users list, and your administrator can activate and deactivate that user as needed.

Named users and services

How does the naming of the user affect the availability of support services to the user?
OLI will support all named users commensurate with the service defined in the software lease agreement. All users will receive direct installation and configuration support.
For paid, limited-service benefits, such as application consulting hours or training hours, OLI will coordinate with the administrator to determine who among their users can directly request these benefits.

Named users versus individual keys

Can one or more named users retain or request an individual key, either for traveling or off-network situations?
Named user access supports off-network use, users can take OLI access with them as they travel without needing to change serial numbers or update access.
Can I access OLI software if there is no internet connection?
Users can work without internet access for up to a week (7 days) before they are required to be on a network again.

Named users versus network concurrencies

How does the naming of the user affect the availability of the software to the user?
Each active user will have access to the software that they have been granted by your administrator. The assigning of the software to the user removes that seat from the bank of available software. In this way, users are assured access to the products they need and misallocated products, sometimes occurring in the network model, are eliminated.
How does the number of named users affect the number of simultaneous users of the software?
They are equivalent. All active users assigned a product will be able to use their assigned products simultaneously, there are no network collisions.
How many simultaneous instances of the software are allowed for a named user? How is this distinguished from simultaneous users?
OLI will accommodate any power user who has multiple software components or instances of a component simultaneously open on one PC, regardless of which components are open / running on the user’s PC. However, if a user logs into a second PC, their first PC’s session will be deactivated.

Client privacy

Does OLI store usage details? What data is shared with OLI when I log in to the system?
When a user logs into OLI software as a named user, their email, the date and time of login, which application was opened and duration open are recorded.
How is authentication made?
OAuth (Open Authorization) is used for authentication and authorization, returning the user-specific access allowed within the OLI software.
Where does the log-in get processed?
Username and password verification are processed on OLI managed servers.