Skip to end of banner
Go to start of banner

Creating Security Profiles

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

What does this section cover?

Navigating to Security Profiles

Finance Application > Security Management > Manage Security Profiles

Explaining Security Profiles Fields

Name

Description

Name*The security profile name
Alternative code*The security profile alternative code
DescriptionA description of the security profile
Module information*

Includes the following:

  • Selection of a module
  • Description of the selected module
Related featuresLists all features which are provided by the selected module
Suggested additional configurationLists other areas of the system that are related with the selected module, as a suggestion for additional configuration
Available menu optionsLists all Main Menu options and Shortcut Menu options and provides the capability to allow or deny access on each one of them
Common processesLists all common processes related with the selected module and provides the capability to allow or deny access on each one of them
Additional processesLists all additional processes related with the selected module and provides the capability to allow or deny access on each one of them
Custom processesLists all custom processes related with the selected module and provides the capability to allow or deny access on each one of them
Web API methodsLists all Web API methods related with the selected module and provides the capability to allow or deny access on each one of them
ReportsLists all reports related with the selected module and provides the capability to allow or deny access on each one of them
PrintoutsLists all printouts related with the selected module and provides the capability to allow or deny access on each one of them
InterfacesLists all interfaces related with the selected module and provides the capability to allow or deny access on each one of them
DashboardsLists all dashboards related with the selected module and provides the capability to allow or deny access on each one of them
Inherited security profilesLists all security profiles which are inherited by the specific security profile

 

Creating & Saving, Validations & Restrictions

ActionValidations
GeneralN/A
Create
  • Multiple security profiles can be created in the system
EditN/A
Delete
  • Security profiles cannot be deleted if there are active users assigned to it.

 

Creating a Security Profile

  1. Search using the criteria available in the summary page
  2. From the top menu click on the New to open the Security Profiles data entry page
  3. MAIN INFORMATION

    1. Provide the required Informatino
      1. Name
      2. Alternative Code
      3. DescriptionSecurity Profiles - Main Information
  4. INHERITED SECURITY PROFILES

    1. Click on ADD to select the Security Profiles that the current one will inherit

      1. Security Profiles Inherited by This Security Profile

        Inherited Security profiles will override configuration made on the existing Security Profile being created. For example if a security profile for team leaders does not allow access to any module configuration, then the security profile for team members, which extends the team leaders security profile will also not have access to any module configuration, even if it is defined within that profile that access is allowed.

        Inherited Security Profiles are helpful when the intention is to create a new Security Profile that will have additional Restrictions to ones from an existing Security Profile. Read below to find out how you can quickly create a new Security Profile Inheriting Restrictions from another.

        Security Profiles - Inherited Security Profiles

  5. MENU ACCESS

    1. MAIN MENU

      1. Use the Filter By Module to select the module to apply access restrictions on
      2. Through the available main menu items select the ones to ALLOW or DENY ACCESS using the relative buttons

        If inherited profiles exist then items may be shown as allowed but they may be denied by the inherited profile.


        Security Profiles - Main Menu

    2. SHORTCUTS MENU

      1. Through the available shortcut menu items select the ones to ALLOW or DENY ACCESS using the relative buttons

        If inherited profiles exist then some shortcut menus may be shown as allowed but they may be denied by the inherited profile.


        Security Profiles - Shortcut Menu

  6. MODULE ACCESS

  7. ATTACHMENTS

    1. Add any files or URLs related to the entity.

      Check  General Settings to find out the restrictions (if any) related to the type and the size of the files you wish to upload. 

      1. For adding a file
        1. Click on Add > Upload File
          Attachments - Upload File 
        2. Drag and Drop the file in the modal 
          OR 
        3. Click in the modal
        4. Select the file to be uploaded
        5. Click on "DONE"
        6. Notes: Provide notes related to the upload
      2. For adding a URL
        1. Click on  "ADD"
          Attachments - URL 
        2. Attachment: Specify the URL
        3. Notes: Provide notes related with the URL


  8. LOG INFORMATION

    The following information is automatically set by the system on saving the Security Profiles

    1. Log information section keeps all the logging information related to the specific record

      • Basic set of information available in all entities
        • Created By User: The user that created the entity
        • Created By Unit: The unit of the user that created the entity
        • Updated By User: The user that last updated the entity
        • Updated by Unit: The unit of the user that last updated the entity
        • Date Created: The date the account was entity
        • Date Updated: The date the account was last entity
          LOG DETAILS


  9. From the Action Menu click on Save

System Processing

 

Visit Understanding Security Profiles for business examples related to Security Profiles


Related Areas

Popular Labels

What does this section cover?

Navigating to Security Profiles

Finance Application > Security Management > Manage Security Profiles

Explaining Security Profiles Fields

Name

Description

Name*The security profile name
Alternative code*The security profile alternative code
DescriptionA description of the security profile
Module information*

Includes the following:

  • Selection of a module
  • Description of the selected module
Related featuresLists all features which are provided by the selected module
Suggested additional configurationLists other areas of the system that are related with the selected module, as a suggestion for additional configuration
Available menu optionsLists all Main Menu options and Shortcut Menu options and provides the capability to allow or deny access on each one of them
Common processesLists all common processes related with the selected module and provides the capability to allow or deny access on each one of them
Additional processesLists all additional processes related with the selected module and provides the capability to allow or deny access on each one of them
Custom processesLists all custom processes related with the selected module and provides the capability to allow or deny access on each one of them
Web API methodsLists all Web API methods related with the selected module and provides the capability to allow or deny access on each one of them
ReportsLists all reports related with the selected module and provides the capability to allow or deny access on each one of them
PrintoutsLists all printouts related with the selected module and provides the capability to allow or deny access on each one of them
InterfacesLists all interfaces related with the selected module and provides the capability to allow or deny access on each one of them
DashboardsLists all dashboards related with the selected module and provides the capability to allow or deny access on each one of them
Inherited security profilesLists all security profiles which are inherited by the specific security profile

 

Creating & Saving, Validations & Restrictions

ActionValidations
GeneralN/A
Create
  • Multiple security profiles can be created in the system
EditN/A
Delete
  • Security profiles cannot be deleted if there are active users assigned to it.

 

Creating a Security Profile

  1. Search using the criteria available in the summary page
  2. From the top menu click on the New to open the Security Profiles data entry page
  3. MAIN INFORMATION

    1. Provide the required Informatino
      1. Name
      2. Alternative Code
      3. DescriptionSecurity Profiles - Main Information
  4. INHERITED SECURITY PROFILES

    1. Click on ADD to select the Security Profiles that the current one will inherit

      1.  Security Profiles Inherited by This Security Profile

  5. ATTACHMENTS

    1. Add any files or URLs related to the entity.

      Check  General Settings to find out the restrictions (if any) related to the type and the size of the files you wish to upload. 

      1. For adding a file
        1. Click on Add > Upload File
          Attachments - Upload File 
        2. Drag and Drop the file in the modal 
          OR 
        3. Click in the modal
        4. Select the file to be uploaded
        5. Click on "DONE"
        6. Notes: Provide notes related to the upload
      2. For adding a URL
        1. Click on  "ADD"
          Attachments - URL 
        2. Attachment: Specify the URL
        3. Notes: Provide notes related with the URL


  6. LOG INFORMATION

    The following information is automatically set by the system on saving the Security Profiles

    1. Log information section keeps all the logging information related to the specific record

      • Basic set of information available in all entities
        • Created By User: The user that created the entity
        • Created By Unit: The unit of the user that created the entity
        • Updated By User: The user that last updated the entity
        • Updated by Unit: The unit of the user that last updated the entity
        • Date Created: The date the account was entity
        • Date Updated: The date the account was last entity
          LOG DETAILS


  7. From the Action Menu click on Save

System Processing

 

Visit /wiki/spaces/WIP/pages/10010220 Security Profiles for business examples related to Creating Security Profiles


Related Areas

Popular Labels

  • No labels