Security & Access Management
This Help File Page was last Modified on 02/01/2012
Security & Access Management This Help File Page was last Modified on 02/01/2012 |
![]() |
![]() |
|
Security & Access Management This Help File Page was last Modified on 02/01/2012 |
![]() |
![]() |
□ | Security related conversations, when talking with Security Professionals about how to provide the necessary protection levels and access rights for their business information, are always a very interesting because they always have lots of opinions (options) on how best to provide that Security. |
• | Everyone has a different view of how secure they should make their system safe but useable. |
• | They know that a high level of security usually means that Employees will experience a lot of security related inconvenience. |
• | With the MKMS Security and Access Management system, it does not have to be that way! |
□ | All it takes is a little bit of planning. |
• | Decide on what information does - and does not - need intensive security protection. |
• | Identify the system entries that will enable your security protection plan. |
• | These required system entries may include: |
• | Setting up your security levels by establishing Security Groups. |
• | Entering your individual Employees and their security assignments. |
• | Entering User Name and Passwords so authorized Employees can login. |
• | Fine tuning who can see what, set what, and do what, using User Access Rights. |
• | Using the MKMS Main Menu Security option (see below) to maintain Passwords, and also to Login and Log out. |
• | When completed, your Users will rarely be aware of the protections you've put into place. |
► | Important Note: A few words about how to deal with a departing Employee: |
• | If you need to remove an Employee from the system (due to termination, death, transfer, etc.), and that Employee has ever been assigned to any record (e.g., an Invoice, a Work Order, as an Operator handling Alarm Activity) within MKMS, |
▪ | Do not delete that Employee's record in the Employee Form (they are part of the transactional history of your Company). |
▪ | Instead, enter an Employment Period Ends Date on the Personal tab of the Employee Form. |
▪ | If that Employee had system access to Login as a User, delete them in Add/Delete Users Form so they can no longer access the system. |
□ | Overview of Security and Access Management steps: |
1. | Define Employee Groups - this allows you to grant, to any employee assigned to that group, specified Forms and the rights to create, read, update, and/or delete the information on those Forms. |
2. | Enter your Employees. |
3. | Using the Security tab on the Employees Form, assign each Employee to an Employee Group and turn on any of the additional rights - offered in this tab - that they must have to do their job. |
4. | Add these Employees to the system's Users file where you will assign them their login User Name and Password. |
5. | In the User Options Form on its Company Options tab, set the number of days before their Password Expires - thereby forcing them to periodically re-set it using the Change Passwords Form. |
□ | Next, go to Employee Groups. |