Back to Security Management Main Page
Excerpt | ||
---|---|---|
| ||
Understand the usage of Security Management within CRM.COM |
. |
Panel | ||||
---|---|---|---|---|
| ||||
Table of Contents
|
What
areis Security Management?
The Security Management module manages the System's security and controls the access to its features. The module also provides a set of business rules which can be used to automatically apply additional security controls.
Note |
---|
For information related to record level access rights and restrictions (e.g. granting exclusive access to Contact Information to the members of the Department that created the Contacts) view Network Management. |
Security Management Glossary
Terms | Descriptions |
---|---|
Security Profile | Security profiles are used to control Provide information regarding the access to modules and features. |
Privacy Level | Privacy levels are used to control Controls the access to data and define defines how they it can be shared within organisational units |
Organizational Unit | Organizational Units are used to organize the company’s network and define the collaboration between them |
CSR | Conditional Security Restrictions |
ACR | Automatic Collaboration Rulesbetween Organisational Units. |
Organisational Unit | Used to organise the company’s network. |
CSR | Stands for Conditional Security Restriction; CSRs define restrictions on features and make processes and attributes more secure, based on conditions. |
ACR | Stand for Automatic Collaboration Rules; ACRs define rules that automatically assign a record on a specific User or Unit to further process the entity up to its completion. |
PLAR | Privacy Level Assignment Rules automatically add a Privacy Level to specific records that meet certain conditions. |
Common Processes | The processes Processes which are common for each module to all modules of the software such as createCreate, read, update, delete processesRead, Update and Delete. |
Additional Processes | Any processes which are not considered as common processesCommon Processes. |
Security Management Key Processes and Concepts
Processes / Concept | Description |
---|---|
EXAMPLE Allocation Process & Allocation Principles | EXAMPLE The allocation process is used to allocate credit transactions against debit transactions to settle them.
|
Security Management Network Characteristics
Applying Privacy Level Restrictions
| Privacy Level Restrictions are applied while configuring the collaboration between Communities and Groups. Privacy Levels are used to apply additional restrictions to those stemming from the specified collaboration options. For example, users belonging to Sales Branch 1 might be able to view records belonging to Sales Branch 2, as long as the Privacy Level of the records is set to 'Public'. Privacy Level Restrictions are applied based on the following logic:
| ||
---|---|---|---|
Applying Privacy Levels on Entities | Users (with permission granted through their security profile) can change the Privacy Level using the dedicated Action 'Set Privacy Level'. The available choices for the new Privacy Level are filtered based on the following logic:
| ||
Unit Automatic Assignment Versus ACR Automatic Assignment | ACR with assignment option 'Based on Geographical Areas' has the same automatic assignment logic as that defined in Units. Extra conditions (entity and organisational) apply making the assignment more specific.
| ||
Logging Changes Done to Records | Audit Log is visible on the top-right corner of the Data Entry pages of all audit trailed entities. Information related to User modifications of records is captured and displayed in the Audit Trail Tab:
|
Security Management Access & Viewing Controls
Business Network Characteristics define the level of access for each record. i.e. Whether , whether it will be available for selection, for viewing or editing etc.
Entity | Network Characteristics | Description |
---|---|---|
Privacy Level Groups | A Privacy Level Groupcan be selected, provided the user adding the Groupbelongs to one of the Allowed Organisational Units defined in the Group, or a collaboration exists between their Unit and the AOU of the Group, or if the user is a Super User. |
Security Management
RelatedRelated Modules
Entity | Interaction of Security Management with Entity | How |
---|---|---|
All Modules |
|
|
Security Management - Business Examples
The following section provides business examples to help you understand of how the CRM.COM Security Management module module is used.
Set up Automatic Collaboration Rule for automatic assignment of Service RequestsAssignment of High Privacy Level Service Requests to Specific User
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to make the following automatic assignment to the user: Supervisor.
CRM.COM Solution ........... User ProcessCreate a ACR with the following configurationsEntity: Service Configurations
User Actions
|
Set up
visibility conditionsVisibility Conditions on Date of Birth
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to hide Customer's Birthday from users that belong to the Customer Service department, as Birthday is only being used relevant for Marketing Purposes and would not like Customer Service department to have access. CRM.COM Solution
<<screenshot>>
|
|
Set up a Privacy Level to be
assignedAssigned to Subscriptions of Type London
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to restrict access to Subscriptions created with type Type 'London' by applying a high 'High' Privacy Level.
CRM.COM Solution...........
<<screenshot>>
|
Company ZX Audit Trail
settingsSettings
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to monitor every time a change of address is done. CRM.COM Solution
<<screenshot>>
|
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Related Areas
|
|
name | grey |
---|