Tags:
view all tags
---+ Role Based Security (RBS) _This release of Appx includes a new method of managing security, known as 'Role Based Security'._ <br />%TOC% ---++ Overview: The new Role Based Security (RBS) will provide an alternative to the existing APPX Security Profiles feature. The resulting run-time security provided by RBS will be similar in function to the run-time security capabilities provided by the existing APPX Security Profiles feature but will be much easier to manage. It is referred to as 'Role Based Security' because the security can be managed by a job function, rather than by individual users. There is a 5 level hierarchy that allows you to define the job functions in your company: <div id="_mcePaste"> * Databases (Companies) * Departments (within a Database) * Workgroups (within a Department) * Roles (within a Workgroup) * Users (within a Role) </div> Each user in the system must be assigned to a Database/Department/Workgroup and Role. Security is then managed by the Database/Department/Workgroup/Role and User. When checking security, the system first looks for permissions at the Role/User level. If nothing is found, it then checks the Role, then the Workgroup, Department and finally Database. This means it is not necessary to establish permissions at each level. For example, if there are processes that everyone is allowed to run, then setting permission at the database level will be sufficient for everyone. This approach also makes it easier to change a users permissions, for example, if an employee is temporarily filling in for someone else, all you have to do is change their role (or add them to the same role as the other employee). You can then remove them from the role or change their role back when the original employee returns. RBS also has an optional 'Inactivity' setting you can use to automatically prevent logins after a certain period of time. For example, you could set this to 30, and anyone who has not logged in during the last 30 days will not be allowed access. Another optional feature is a 'Timeout' setting, where the user will be logged off after X minutes of inactivity. Both of those settings can be set at the Database, Department, Workgroup, Role and User level. Lower levels take priority over higher levels, so a setting at the User level overrides all other levels. RBS allows you to control execution of processes by the parent/child process combination. In other words, a user might be able to run 'Customer File Maintenance' from the 'File Maintenance' menu, but not from the Order Entry screen. This is managed by 'Access Control Lists' which will define which users are allowed to access various application objects at run-time and with which permissions. A Parameter file sets default actions and other features of RBS. RBS is accessed from the 'System Administration' menu. ---++ Getting Started 1 <span style="color: #0000ff;"><span style="text-decoration: underline;"> [[RBSSetupDefineHierarchy][Define your Databases, Departments, Workgroups, Roles, Users]]</span></span> 1 [[RBSSetupCreateAccessControlList][Create Access Control List]] 1 [[RBSSetProcessSecurity][Set Process Security]] 1 [[RBSSetFileSecurity][Set File/Field Security]] 1 <span style="color: #0000ff; text-decoration: underline;"> [[RBSSetupSetConfiguration][Setting RBS Configuration]]</span> ---++ Reference Managing Security 1 <span style="color: #0000ff; text-decoration: underline;"> [[RBSSetConfiguration][Security Configuration]]</span> 1 [[RBSMaintainHierarchy][Security Hierarchy Maintenance]] 1 [[RBSSetProcessSecurity][Access Control List - Processes]] 1 [[RBSSetFileSecurity][Access Control List - Files/Fields]] Reports 1 [[RBSSecurityList][Security Hierarchy List/Export]] 1 [[RBSUsersList][Users]] 1 [[RBSInactivityReport][Inactivity Report]] 1 [[RBSUserOverrides][User Security Overrides]] 1 <span style="color: #0000ff; text-decoration: underline;"> [[RBSLockedUsers][Locked Users]]</span> 1 [[RBSNewChangedObjects][New/Changed Objects]] 1 [[RBSUserRights][User Rights]] Utilities 1 [[RBSCreateAccessControlList][Create Access Control List]] 1 [[RBSExport][Export Hierarchy]] 1 [[RBSImport][Import Hierarchy]] 1 [[RBSCopySecurity][Copy Security]] 1 [[LastLogin][User Last Login Date/Time]] ---++ Comments: _Read what other users have said about this page or add your own comments._ <br />%COMMENT% -- Main.JeanNeron - 2012-10-30
Edit
|
Attach
|
Watch
|
P
rint version
|
H
istory
:
r9
<
r8
<
r7
<
r6
<
r5
|
B
acklinks
|
V
iew topic
|
Raw edit
|
More topic actions...
Topic revision: r8 - 2015-03-18
-
JeffPrentice
Home
Site map
Main web
MedicaidBilling web
Sandbox web
TWiki web
Main Web
Users
Groups
Index
Search
Changes
Notifications
RSS Feed
Statistics
Preferences
P
View
Raw View
Print version
Find backlinks
History
More topic actions
Edit
Raw edit
Attach file or image
Edit topic preference settings
Set new parent
More topic actions
Account
Log In
Edit
Attach
Copyright © 2008-2024 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki?
Send feedback