Back to Security Management Main Page
Excerpt | ||
---|---|---|
| ||
Understand the usage of Security Management within CRM.COM |
. |
Panel | ||||
---|---|---|---|---|
| ||||
Table of Contents
|
What
areis Security Management?
The Security Management module manages the System's security and controls the access to its features. The module also provides a set of business rules which can be used to automatically apply additional security controls.
Note |
---|
For information related to record level access rights and restrictions (e.g. granting exclusive access to Contact Information to the members of the Department that created the Contacts) view Network Management. |
Security Management Glossary
Terms | TermDescriptions | Description |
---|---|---|
Security Profile | Provide information regarding the access to modules and features. | |
Privacy Level | Controls the access to data and defines how it can be shared between Organisational Units. | |
Organisational Unit | Used to organise the company’s network. | |
CSR | Stands for Conditional Security Restriction; CSRs define restrictions on features and make processes and attributes more secure, based on conditions. | |
ACR | Stand for Automatic Collaboration Rules; ACRs define rules that automatically assign a record on a specific User or Unit to further process the entity up to its completion. | |
PLAR | Privacy Level Assignment Rules automatically add a Privacy Level to specific records that meet certain conditions. | |
Common Processes | Processes which are common to all modules of the software such as Create, Read, Update and Delete. | |
Additional Processes | Any processes which are not considered as Common Processes. |
Security Management Key Processes and Concepts
Processes / Concept | Description |
---|---|
EXAMPLE Allocation Process & Allocation Principles | EXAMPLE The allocation process is used to allocate credit transactions against debit transactions to settle them.
|
Security Management Network Characteristics
Applying Privacy Level Restrictions
| Privacy Level Restrictions are applied while configuring the collaboration between Communities and Groups. Privacy Levels are used to apply additional restrictions to those stemming from the specified collaboration options. For example, users belonging to Sales Branch 1 might be able to view records belonging to Sales Branch 2, as long as the Privacy Level of the records is set to 'Public'. Privacy Level Restrictions are applied based on the following logic:
| ||
---|---|---|---|
Applying Privacy Levels on Entities | Users (with permission granted through their security profile) can change the Privacy Level using the dedicated Action 'Set Privacy Level'. The available choices for the new Privacy Level are filtered based on the following logic:
| ||
Unit Automatic Assignment Versus ACR Automatic Assignment | ACR with assignment option 'Based on Geographical Areas' has the same automatic assignment logic as that defined in Units. Extra conditions (entity and organisational) apply making the assignment more specific.
| ||
Logging Changes Done to Records | Audit Log is visible on the top-right corner of the Data Entry pages of all audit trailed entities. Information related to User modifications of records is captured and displayed in the Audit Trail Tab:
|
Security Management Access & Viewing Controls
Business Network Characteristics define the level of access for each record. i.e. Whether , whether it will be available for selection, for viewing or editing etc.
Entity | Network Characteristics | Description |
---|---|---|
Accounts Receivable Classifications |
Security Management Related Modules
Privacy Level Groups | A Privacy Level Groupcan be selected, provided the user adding the Groupbelongs to one of the Allowed Organisational Units defined in the Group, or a collaboration exists between their Unit and the AOU of the Group, or if the user is a Super User. |
---|
Security Management Related Modules
Entity | Interaction of Security Management with Entity |
---|---|
All Modules |
|
Security Management - Business Examples
The following section provides business examples to help you understand of how the CRM.COM Security Management module module is used.
Title of the Business exampleAssignment of High Privacy Level Service Requests to Specific User
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to make the following automatic assignment to the user: Supervisor.
CRM.COM Solution Configurations
User Actions
|
Set up Visibility Conditions on Date of Birth
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to hide Customer's Birthday from users that belong to the Customer Service department, as Birthday is only relevant for Marketing Purposes. CRM.COM Solution
|
Set up a Privacy Level to be Assigned to Subscriptions of Type London
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to restrict access to Subscriptions created with Type 'London' by applying a 'High' Privacy Level. CRM..COM Solution
|
Company ZX Audit Trail Settings
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to monitor every change of address. CRM.COM Solution
|
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Related Areas
|
|
name | grey |
---|