Security & Access Management
This Help File Page was last Modified on 02/01/2012
|
Security & Access Management This Help File Page was last Modified on 02/01/2012 |
|
|
|
|
Security & Access Management This Help File Page was last Modified on 02/01/2012 |
|
|
| □ | Security related conversations, when talking with Security Professionals about how to provide the necessary protection levels and access rights for their business information, are always a very interesting because they always have lots of opinions (options) on how best to provide that Security. |
| • | Everyone has a different view of how secure they should make their system safe but useable. |
| • | They know that a high level of security usually means that Employees will experience a lot of security related inconvenience. |
| • | With the MKMS Security and Access Management system, it does not have to be that way! |
| □ | All it takes is a little bit of planning. |
| • | Decide on what information does - and does not - need intensive security protection. |
| • | Identify the system entries that will enable your security protection plan. |
| • | These required system entries may include: |
| • | Setting up your security levels by establishing Security Groups. |
| • | Entering your individual Employees and their security assignments. |
| • | Entering User Name and Passwords so authorized Employees can login. |
| • | Fine tuning who can see what, set what, and do what, using User Access Rights. |
| • | Using the MKMS Main Menu Security option (see below) to maintain Passwords, and also to Login and Log out. |
| • | When completed, your Users will rarely be aware of the protections you've put into place. |
| ► | Important Note: A few words about how to deal with a departing Employee: |
| • | If you need to remove an Employee from the system (due to termination, death, transfer, etc.), and that Employee has ever been assigned to any record (e.g., an Invoice, a Work Order, as an Operator handling Alarm Activity) within MKMS, |
| ▪ | Do not delete that Employee's record in the Employee Form (they are part of the transactional history of your Company). |
| ▪ | Instead, enter an Employment Period Ends Date on the Personal tab of the Employee Form. |
| ▪ | If that Employee had system access to Login as a User, delete them in Add/Delete Users Form so they can no longer access the system. |
| □ | Overview of Security and Access Management steps: |
| 1. | Define Employee Groups - this allows you to grant, to any employee assigned to that group, specified Forms and the rights to create, read, update, and/or delete the information on those Forms. |
| 2. | Enter your Employees. |
| 3. | Using the Security tab on the Employees Form, assign each Employee to an Employee Group and turn on any of the additional rights - offered in this tab - that they must have to do their job. |
| 4. | Add these Employees to the system's Users file where you will assign them their login User Name and Password. |
| 5. | In the User Options Form on its Company Options tab, set the number of days before their Password Expires - thereby forcing them to periodically re-set it using the Change Passwords Form. |
| □ | Next, go to Employee Groups. |