Data Extract Utilities and SFTP Key Exchange Manager Tool Rights

This tool rights article defines the available tool rights for the following tools:

  • Data Extract Utilities
  • Data Extract Utility SFTP Key Exchange Manager

Data Extract Utilities

The Data Extract Utilities tools provide an automated data extract tool for transferring data via a flat file from Infinite Campus servers. The tools can also upload Campus data into third-party software. 

See the Data Extract Utilities article for detailed information about this tool. 

Screenshot fo Data Extract Utilites Editor.Data Extract Utilities Editor

Note: When the Date Extract Utility, Data Extract Zip, and Data Extract History tools were combined into one tool (Campus.2539), the previous tool rights did not automatically translate into the tool rights for the combined tool. Admins will have to re-grant tool rights to the Data Extract Utilities.

Available Tool Rights

R W A D
  • Access and view the Data Extract Utilities tool. 
  • Select a Data Extract Option from the editor and view the Detail Information.  
  • Select extracts to view the history of its usage.

Modify and save information for existing extracts.

Create new extracts and save the entered information.

Delete extracts from the tool.


Data Extract Utility SFTP Key Exchange Manager

The Data Extract Utility SFTP Key Exchange Manager allows SFTP configurations within the Data Extract Utility to utilize a keypair between Infinite Campus and a third-party server(s) to bolster security for the data transferring process.

See the SFTP Key Exchange Manager article for detailed information about this tool. 

Screenshot of the SFTP Key Exchange Manager Tool, located at System Settings, Data Utilities.Data Extract Utility SFTP Key Exchange Manager Tool

Available Tool Rights

RWAD
  • Access and view the Data Extract Utility SFTP Key Exchange Manager tool. 
  • Select a configuration Name and view the details. 
  • Modify and save information for existing configurations. 
  • Create new configurations and save the entered information. 
  • Delete configurations.

Suggested User Groups

Typically, users of these tools have already been assigned one or more Product Security Roles that grant administrative-level access; therefore, a user group assignment is not necessary.

If your district's needs are different, you may choose to create a group that meets those needs.

See User Groups and Suggested Roles for more information.