Introduction
Astrato Writeback and Actions work together to create interactive dashboards where users can update data and trigger processes directly from visualizations. This guide demonstrates one approach to implementing authorization workflows that control user access and enable secure data modifications, though there are many ways to configure these features based on your specific requirements.
Use Case: Secure Incident Log Update Workflow
This example shows an incident management dashboard where only authorized personnel can update incident information. Actions validate user permissions, dynamically activate writeback controls, and send automated notifications.
When a user accesses the dashboard, an Action checks their authorization level. Authorized users see active writeback buttons and can update incident status, notes, and details in real-time. Unauthorized users see disabled buttons and receive messaging explaining their access level.
Implementation Breakdown
1. Before Workbook Opens Actions
Automatically captures the username and current date when the dashboard is accessed. This information enables the system to check user permissions and maintain audit trails for security and compliance purposes.
2. On Sheet Entry Actions
When users navigate to the incident log sheet, this Action manages the authorization process and interface setup:
Verifies permissions against the authorization database using the captured username
Activates or deactivates writeback buttons based on authorization results
Ensures all users start at the review table for consistent navigation
Records activities for troubleshooting (visible in developer tools if needed)
Note: Log blocks are best practice for troubleshooting and monitoring. Procedure blocks enable code reuse.
3. Authorization Actions
Performs the core authorization logic:
Checks which user is logged in against the authorization database
Sets update and approve buttons to active or inactive based on permissions
Enables authorized users to writeback data while preventing unauthorized access
Automatically informs users of their authorization status through messaging
4. Button Actions
Manages dynamic button behavior based on authorization results:
Sets buttons to active or inactive based on user authorization status
Automatically adjusts the user interface to reflect permission levels
Ensures only authorized users can interact with writeback functionality
5. Writeback Function
Enables authorized users to update incident data through an intuitive interface:
Users select a specific row from the incident table
Current data automatically populates into an editable form
Users make appropriate adjustments and submit changes
Updates are written back to the source data system in real-time
This workflow ensures data security while providing authorized users with seamless incident management capabilities.
Conclusion
This article demonstrated how Astrato Writeback and Actions combine to create secure, interactive dashboards through an incident log management example. By implementing authorization checks, dynamic button controls, and form-based writeback functionality, these features transform static dashboards into dynamic tools that maintain data security while enabling real-time updates for qualified users.
The workflow pattern shown here—capturing user information, validating permissions, controlling interface elements, and providing secure data modification capabilities—can be applied to any scenario requiring controlled data interaction within Astrato dashboards, from project management to operational reporting.