Skip to end of banner
Go to start of banner

Understanding Security Management

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

What does this section cover?

What are Security Management ?

Security Management  Glossary

TermsDescriptions
Security ProfileSecurity profiles are used to control access to features

Privacy Level

Privacy levels are used to control access to data and define how they can be shared within organisational units
Organizational Unit

Organizational Units are used to organize the company’s network and define the collaboration between them

CSRConditional Security Restrictions
ACRAutomatic Collaboration Rules
PLARPrivacy Level Assignment Rules
Common ProcessesThe processes which are common for each module of the software such as create, read, update, delete processes.
Additional ProcessesAny processes which are not considered as common processes

Security Management  Key Processes and Concepts

 

Processes / ConceptDescription

EXAMPLE

Allocation Process & Allocation Principles

EXAMPLE

The allocation process is used to allocate credit transactions against debit transactions to settle them.
The allocation process is an automated process triggered every time a financial transaction becomes 'Posted'.
Within CRM.COM, you have the option to select between one of 2 main allocation process principles, that will be applied to all financial transactions within the system;

  • FIFO :Where a credit is allocated against the oldest available (non-allocated) debit automatically
  • FIFO & Against Item :Where a credit is allocated first against a designated debit and any remaining amount is allocated FIFO
  

Security Management  Network Characteristics

Network Characteristics define the level of access for each record. i.e. Whether it will be available for selection, for viewing or editing etc.

EntityNetwork Characteristics
Privacy Level Groups

 

Security Management  Related Modules 

Interaction EntityHow
All ModulesSecurity Profiles controlled the access of users to all modules

 

Security Management  - Business Examples

The following section provides business examples to help you understand how CRM.COM Security Management  module is used.

Set up Automatic Collaboration Rule for automatic assignment of Service Requests

Set up Automatic Collaboration Rule for automatic assignment of Service Requests

Business Requirement

Company ZX would like to make the following automatic assignment to the user: Supervisor

  • Service Requests of type informational and Privacy Level Super High 
  • All Service Request types that have Privacy Level High
  • Regardless of the Organizational Unit the user that opened them belongs to

 

CRM.COM Solution

...........

  • User Process
     
    • Create a ACR with the following configurations
      • Entity: 
        • Service Requests
      • Entity Conditions:
        • Type: Informational and Privacy Level: Super High
        • No Type and Privacy Level: High
      • Organisational Conditions: 
        • NONE


More Information on Set up Automatic Collaboration Rule can be found at: Creating Automatic Collaboration Rules (ACR)

 

Set up visibility conditions on Date of Birth

Set up visibility conditions on Date of Birth

Business Requirement

Company ZX would like to hide Customer's Birthday from users that belong to Customer Service as Birthday is only being used for Marketing Purposes and would not like Customer Service department to have access. 

CRM.COM Solution

  • User Process
     
    Create a CSR with the following configurations
    • Entity: Contact Information
    • Field Restrictions: Day of Birth
    • Organisational Conditions: Customer Service

<<screenshot>>

More Information on Set up visibility conditions can be found at: Creating Conditional Security Restrictions (CSR)


 

Set up a Privacy Level to be assigned to Subscriptions of Type London

Set up a Privacy Level to be assigned to Subscriptions of Type London

Business Requirement

Company ZX would like to restrict access to Subscriptions created with type London by applying a high Privacy Level.

 

CRM.COM Solution

...........

  • Configuration
    • Create a PLAR with the following configurations
      • Name: London Subscriptions
      • State: Active
      • Assignment Options: Specific
      • Privacy Level: High
      • Entity Conditions:
        • Entity: Subscriptions
        • Entity Type: London

<<screenshot>>

 

More Information on Set up a Privacy Level can be found at: Creating Privacy Level Assignment Rules (PLAR)

 

Company ZX Audit Trail settings

Company ZX Audit Trail settings

Business Requirement

Company ZX would like to monitor every time a change of address is done.

CRM.COM Solution

  • Configuration 

    Create an active Audit Trail record with the following settings

    • Entity: Contact Information
    • Fields: 
      • Contact Information Addresses
      • Contact Information Addresses/Area
      • Contact Information Addresses/Country
      • Contact Information Addresses/District
      • Contact Information Addresses/Municipality
      • Contact Information Addresses/Postal Code
      • Contact Information Addresses/State
      • Contact Information Addresses/Street Name
      • Contact Information Addresses/Street Number
      • Contact Information Addresses/Town
      • Contact Information Addresses/Type

<<screenshot>>

 

More Information on Audit Trail settings can be found at: Setting Audit Trailed Entities


Related Areas

Popular Labels

  • No labels