When defining security settings, the CA users and their associated permissions need to be configured. These settings include defining what information should be accessible to a user (which entities within the system can the user view or edit). These permissions can be set at various levels from user groups, roles or even individually per user. Accessible information is defined in relation to Contract parties and can be set directly to the user, or inherited from the user group to which the user belongs.
It is at this stage that the main roles are configured and the user groups associated with them, so that when a new user is added, they need only be attached to a group in order to inherit the relevant settings.
Permitted actions are configured in the roles, and are issued to the user by directly associating the user with a role, or by the user group to which the user belongs. Permitted Dashboard related actions are also defined in the attached role.
It is recommended that the Administrator determines which user groups and roles should be defined, and their required permission in order to be able to set up a structure that allows for the easy addition of users.
|
Copyright © 2013 CA.
All rights reserved.
|
|