This feature provides role-based access control, ensuring that users with View Only access can only see non-editable data throughout the system. It is sometimes called Read Only.
Scenario: A global organization uses CPM software to manage multiple departments' financial reporting. Board members require access to view reporting and inputs without modifying underlying data.
Solution: The CPM software allows the administrator to assign different user types with varying permissions. The board is given a 'Read Only' role. This allows them to login to the system and view financial reports, budgets, scenarios, dashboards and more without damaging underlying data.
This is a very basic requirement for systems that sell named user licenses. They're usually less expensive, and often the product includes several for free. This differs from “report only” licenses, as view users can see all sheets, reports, dashboards, but can not manipulate any of them.
From a functional perspective, the product should have a simple checkbox that turns the user into a View Only accessor. For more granular security, see additional security-related requirements.