Back to Security Management Main Page
Excerpt | ||
---|---|---|
| ||
Understand the usage of Security Management within CRM.COM |
. |
Panel | ||||
---|---|---|---|---|
| ||||
Table of Contents
|
What is Security Management?
The Security Management module manages all security aspects of the software. Access to features of the software and access to data can be controlled through the Security Management module. In addition the module the System's security and controls the access to its features. The module also provides a set of business rules which can be used to automatically apply additional security controls.
Note |
---|
For information related to record level access rights and restrictions (e.g. granting exclusive access to Contact Information to the members of the Department that created the Contacts) view Network Management. |
Security Management Glossary
Terms | Descriptions |
---|---|
Security Profile | Security profiles are used to control Provide information regarding the access to modules and features. |
Privacy Level | Privacy levels are used to control Controls the access to data and define defines how they it can be shared within organisational units |
Organizational Unit | Organizational Units are used to organize the company’s network and define the collaboration between them |
CSR | Conditional Security Restrictions |
ACR | Automatic Collaboration Rulesbetween Organisational Units. |
Organisational Unit | Used to organise the company’s network. |
CSR | Stands for Conditional Security Restriction; CSRs define restrictions on features and make processes and attributes more secure, based on conditions. |
ACR | Stand for Automatic Collaboration Rules; ACRs define rules that automatically assign a record on a specific User or Unit to further process the entity up to its completion. |
PLAR | Privacy Level Assignment Rules automatically add a Privacy Level to specific records that meet certain conditions. |
Common Processes | The processes Processes which are common for each module to all modules of the software such as createCreate, read, update, delete processesRead, Update and Delete. |
Additional Processes | Any processes which are not considered as common processesCommon Processes. |
Security Management Key Processes and Concepts
Processes / Concept | Description | ||||
---|---|---|---|---|---|
Applying Privacy Level Restrictions
| Privacy level restrictions Level Restrictions are applied as part of the processes which are enforcing the collaboration between communities and groups. Privacy levels while configuring the collaboration between Communities and Groups. Privacy Levels are used to apply additional restrictions on top of the restrictions which are derived by to those stemming from the specified collaboration options. For example, users belonging to sales branch Sales Branch 1 might be able to view records belonging to sales branch 2 only if their privacy level Sales Branch 2, as long as the Privacy Level of the records is set to public. The following logic is followed to apply privacy level restrictions: Record'Public'. Privacy Level Restrictions are applied based on the following logic:
| ||||
Applying Privacy Levels on Entities | All Users Users (with permission granted through their security profile) can change the privacy level, through a dedicated “Set Privacy Level” action, if they are allowed by the security profile assigned to them. The new Privacy Levels which can be set Privacy Level using the dedicated Action 'Set Privacy Level'. The available choices for the new Privacy Level are filtered based on the following logic:
| ||||
Unit Automatic Assignment Versus ACR Automatic Assignment | ACR with assignment option "'Based on Geographical Areas "' has the same automatic assignment logic as the one defined in Units, however the ACR offers you extra conditions (Entity & Organisational conditions), to makethat defined in Units. Extra conditions (entity and organisational) apply making the assignment more specific. For more information on how the system will make the assignment visit Applying Network Management Restrictions -Applying Automatic Collaboration Rules based on Covered Geographical Areas | Applying Audit Trail | Audit Trail is visible in the detail pages of all Audit Trailed Entities, as a tab at the bottom. If an entity is audit trailed and a user makes changes to an audit trailed field then all the related information will be captured and made available in the Audit Trail Tab of the specific record. The information displayed in the audit trail tab is the following: Attribute: The field that has been manipulated
| ||
Logging Changes Done to Records | Audit Log is visible on the top-right corner of the Data Entry pages of all audit trailed entities. Information related to User modifications of records is captured and displayed in the Audit Trail Tab:
|
Security Management
Network CharacteristicsAccess & Viewing Controls
Business Network Characteristics define the level of access for each record. i.e. Whether , whether it will be available for selection, for viewing or editing etc.
Entity | Network Characteristics | Description |
---|---|---|
Privacy Level Groups | A Privacy Level Groupcan be selected, provided the user adding the Groupbelongs to one of the Allowed Organisational Units defined in the Group, or a collaboration exists between their Unit and the AOU of the Group, or if the user is a Super User. |
Security Management Related Modules
Entity | Interaction of Security Management with EntityHow |
---|---|
All Modules |
|
Security Management - Business Examples
The following section provides business examples to help you understand of how the CRM.COM Security Management module is used.
Set up Automatic Collaboration Rule for automatic assignment of Service RequestsAssignment of High Privacy Level Service Requests to Specific User
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to make the following automatic assignment to the user: Supervisor.
CRM.COM Solution User Process Create aConfigurations
User Actions
|
Set up
visibility conditionsVisibility Conditions on Date of Birth
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to hide Customer's Birthday from users that belong to the Customer Service department, as Birthday is only being used relevant for Marketing Purposes and would not like Customer Service department to have access. CRM.COM Solution
|
Set up a Privacy Level to be
assignedAssigned to Subscriptions of Type London
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to restrict access to Subscriptions created with type Type 'London' by applying a high 'High' Privacy Level. CRM.COM Solution
|
Company ZX Audit Trail
settingsSettings
Panel | ||||
---|---|---|---|---|
| ||||
Business Requirement Company ZX would like to monitor every time a change of address is done. CRM.COM Solution
|
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Related Areas
|
|
name | grey |
---|