Skip to end of banner
Go to start of banner

Security

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Security Settings

Security features are configured and managed via the Settings option, this manual covers two areas of security:

  • User Roles & Users

  • API Keys

To configure your Security settings click on your logged-in user name in the top right-hand-corner of the screen > Settings > Security.

User Roles & Users

Users are the people who perform the day-to-day tasks (e.g. process service requests/orders, monitor performance, setup configuration) either through the User Interface or Web APIs, subject to business network and security restrictions.

User Roles are a group of permissions assigned to users and define the access that users have throughout the system (e.g. to manage Contacts, to configure Reward Offers).

API Keys

  • API Keys are unique identifiers that allow a client application (e.g. mobile app, external system) to consume the system's Web API (back-office/self-service)

    • Public Key is used solely as an organisation identification allowing users to consume self-service APIs

    • Secret Key should be kept confidential and are used for performing business actions in the CRM.COM product (such keys fall under security restrictions and permissions)

Heading 3

Heading 3

Formatted text

Heading 3

Security

Reference Material

You may also find it useful to refer to the following manuals for further reading in relation to Security.

Business Network

<link>

TABLE OF CONTENTS

  • No labels