gearSettings

The Settings page provides a centralized location for configuring key aspects of the ADAPT tool to meet your specific needs. In ADAPT, the Settings includes Data Sources, Data Suppression, Footer Links, Security, and User Management.

To access the Settings Page, select the Settings button on the left-hand navigation menu.

Highlighted "Settings" menu item in the left navigation menu. This button, represented by a gear icon, provides access to configuration options and preferences for the application.
Settings Button in Navigation Menu

Settings Page Feature Highlights

Each category on the Settings page includes features to improve efficiency, maintain privacy, and customization options to tailor around your needs. Below the screenshot is an overview of the categories available in the Settings.

Settings page in ADAPT allows users to configure various aspects of their experience. The page provides descriptions and options for managing key settings, including:  Data Sources: Connect to databases to create, manage, and update data sources for report creation. Data Suppression: Configure suppression rules to protect sensitive data while maintaining compliance. Footer Links: Edit and manage footer content, including privacy policies and terms of service. Security: Adjust security settings, such as session timeouts and alerts, to protect user data. User Management: Administer users and roles within the application, ensuring secure access control.
Settings Page
  • Data Sources: Connect to a database, create and manage data sources, and configure existing data sources to ensure they are up-to-date and ready for report creation.

  • Data Suppression: Define your suppression rules to protect sensitive data.

  • Footer Links: Customize and manage footer content displayed, such as privacy policies and terms of service.

  • Language Translation Options: Configure the language you'd like to see on your external reports.

  • Security: Configure security settings, including session timeouts and alerts, to protect user data and maintain system integrity.

  • User Management: Manage user roles and permissions to ensure secure access control and efficient user oversight.


The following sections will walk you through how to use and manage each category in the Settings.

Last updated