MKMS Help

Security & Access Management

This Help File Page was last Modified on 02/01/2012

Security & Access Management

This Help File Page was last Modified on 02/01/2012

Previous topic Next topic  

Security & Access Management

This Help File Page was last Modified on 02/01/2012

Previous topic Next topic  
Security related conversations, when talking with Security Professionals about how to provide the necessary protection levels and access rights for their business information, are always a very interesting because they always have lots of opinions (options) on how best to provide that Security.
Everyone has a different view of how secure they should make their system safe but useable.
They know that a high level of security usually means that Employees will experience a lot of security related inconvenience.
With the MKMS Security and Access Management system, it does not have to be that way!

 

All it takes is a little bit of planning.
Decide on what information does - and does not - need intensive security protection.
Identify the system entries that will enable your security protection plan.
These required system entries may include:
Setting up your security levels by establishing Security Groups.
Entering your individual Employees and their security assignments.
Entering User Name and Passwords so authorized Employees can login.
Fine tuning who can see what, set what, and do what, using User Access Rights.
Using the MKMS Main Menu Security option (see below) to maintain Passwords, and also to Login and Log out.
When completed, your Users will rarely be aware of the protections you've put into place.

 

Important Note: A few words about how to deal with a departing Employee:
If you need to remove an Employee from the system (due to termination, death, transfer, etc.), and that Employee has ever been assigned to any record (e.g., an Invoice, a Work Order, as an Operator handling Alarm Activity) within MKMS,
Do not delete that Employee's record in the Employee Form (they are part of the transactional history of your Company).
Instead, enter an Employment Period Ends Date on the Personal tab of the Employee Form.
If that Employee had system access to Login as a User, delete them in Add/Delete Users Form so they can no longer access the system.

 

Overview of Security and Access Management steps:
1.Define Employee Groups - this allows you to grant, to any employee assigned to that group, specified Forms and the rights to create, read, update, and/or delete the information on those Forms.
2.Enter your Employees.
3.Using the Security tab on the Employees Form, assign each Employee to an Employee Group and  turn on any of the additional rights - offered in this tab - that they must have to do their job.
4.Add these Employees to the system's Users file where you will assign them their login User Name and Password.
5.In the User Options Form on its Company Options tab, set the number of days before their Password Expires - thereby forcing them to periodically re-set it using the Change Passwords Form.

 

Next, go to Employee Groups.