Excerpt | ||
---|---|---|
| ||
Find out how to create a new Security Profile |
What does this section cover?
Table of Contents | ||
---|---|---|
|
Navigating to Security Profiles
Info |
---|
FINANCE APPLICATION > SECURITY MANAGEMENT > MANAGE SECURITY PROFILES |
Explaining Security Profiles Fields
Name | Description |
---|---|
Name* | The security profile name |
Alternative code* | The security profile alternative code |
Description | A description of the security profile |
Module information* | Includes the following:
|
Related features | Lists all features which are provided by the selected module |
Suggested additional configuration | Lists other areas of the system that are related with the selected module as a suggestion for additional configuration |
Available menu options | Lists all Main Menu options and Shortcut Menu options and provides the capability to allow or deny access on each one of them |
Common processes | Lists all common processes related with the selected module and provides the capability to allow or deny access on each one of them |
Additional processes | Lists all additional processes related with the selected module and provides the capability to allow or deny access on each one of them |
Custom processes | Lists all custom processes related with the selected module and provides the capability to allow or deny access on each one of them |
Web API methods | Lists all Web API methods related with the selected module and provides the capability to allow or deny access on each one of them |
Reports | Lists all reports related with the selected module and provides the capability to allow or deny access on each one of them |
Printouts | Lists all printouts related with the selected module and provides the capability to allow or deny access on each one of them |
Interfaces | Lists all interfaces related with the selected module and provides the capability to allow or deny access on each one of them |
Dashboards | Lists all dashboards related with the selected module and provides the capability to allow or deny access on each one of them |
Inherited security profiles | Lists all security profiles which are inherited by the specific security profile |
Creating & Saving, Validations & Restrictions
Action | Validations |
---|---|
General |
|
Create |
|
Edit |
|
Delete |
|
Save |
|
Creating a Security Profile
- Search using using the criteria available in the summary page
- From the top menu click on the NEW to open the Security Profiles data entry page
MAIN INFORMATION
- Provide the required Information:
- Name
- Alternative Code
- Description
- Provide the required Information:
INHERITED SECURITY PROFILES
Click on ADD to select Security Profiles Inherited by This Security Profile
Info Inherited Security profiles will override configuration made on the existing Security Profile being created. For example if a security profile for team leaders does not allow access to any module configuration, then the security profile for team members, which extends the team leaders security profile will also not have access to any module configuration, even if it is defined within that profile that access is allowed.
Inherited Security Profiles are helpful when the intention is to create a new Security Profile that will have additional Restrictions to ones from an existing Security Profile. Read below to find out how you can quickly create a new Security Profile Inheriting Restrictions from another.
MENU ACCESS
MAIN MENU
- Use the Filter By Module to select the module to apply access restrictions on
Through the available main menu items select the ones to ALLOW or DENY ACCESS using the related buttons
Info If inherited profiles exist then items may be shown as allowed but they may be denied by the inherited profile.
SHORTCUTS MENU
Through the available shortcut menu items select the ones to ALLOW or DENY ACCESS using the related buttons
Info If inherited profiles exist then some shortcut menus may be shown as allowed but they may be denied by the inherited profile.
MODULE ACCESS
There is a list with all the modules available on the left hand side of the screen
Filter the list of the available modules by selecting an application through the filters list which is available on top of the list of modules
Use the list of modules to select one of them and define the following processes available:
Common Processes
Additional Processes
Custom Processes
Web API
Reports
Dashboards
Interfaces
Printouts
Select the ones to ALLOW or DENY ACCESS using the relative buttons
Info If inherited profiles exist then some modules may be shown as allowed but they may be denied by the inherited profile
Click on SAVE
LOG INFORMATION
The following information is automatically set by the system on saving the Security Profiles
Include Page Log Information - Global Log Information - Global
Note |
---|
Visit Understanding Security Management for business examples related to Security Profiles. |
Panel | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
Related Areas
|
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
Popular Labels
|
...