Section 12.5 Security Policy

Section 12.5 Security Policy

Section 12.5  Creating a Security Policy

Administrators can create a security policy for a user or a role. Components of a Policy include the level (user/role), accessibility settings (group/user/role), and action settings. Each Security Policy must address all areas of WIB Review: who can access each area, what actions are allowed and to whom or which role/user the policy applies.

Section 12.5.1                  Policy Name

Name the policy in such a way that it describes either the role or an individual user’s job function. It is suggested that the Policy Name be different from the Group or Username, as staff and responsibilities change over time, and you want the Policy to reflect the functionality that persists. You can change the name of the policy.

Section 12.5.2         Security Policy Definition (SPD)

A Security Policy definition is comprised of Policies and Scopes, which are applied to a User or a Group of Users. Go to Policies\Overview and select New. You will be prompted to select either Wizard or Design View to create the new policy.

Section 12.5.2.1           Security Policy Wizard

The Wizard walks you through each page of the portal and guides you through the sections and actions available to users. Take into consideration the job functions of the group or user you are creating a policy for, and assign which areas of the portal they should have access to and what actions they are permitted to take.

Section 12.5.2.2            Security Policy Design View

You are not required to use the Wizard; you can also create a Policy in Design view. You can toggle from the Wizard to Design view using the button in the right corner of the Wizard stepper.

    • Related Articles

    • Section 12 Security Management

      Security Management Security Management allows Administrators to set up users or groups, and policies and scopes, which, combined, become a Security Policy Definition (SPD). Policies are vital for keeping proper access rights to your most sensitive ...
    • Section 12.1 Password Policy

      Section 12.1 Password PolicyA password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. The computer system will force users to follow the password policy. WIB™ ...
    • Section 12.3 Groups

      Section 12.3 Groups A group of users is given access to work areas (scope of projects/collections) that all need access to the same resources. Groups can be created based on individual users who all need access to certain resources or based on global ...
    • Section 12.4 Users

      Section 12.4 Users A user is associated with an access license (UAL). They are not shared by Users; each User must have their own UAL. Once a User has their own UAL, it does not matter how many machines they log in from. Users are assigned a Role and ...
    • Section 12.2 Users, Groups, Policies, and Scopes Organizational Chart

      Section 12.2 Organizational Chart of Users, Groups, Policies, and Scopes Section 12.2.1 Security Quick Start Reference 1 Create a Policy 2 Create a Scope 3 Add a Policy to a Group and assign the scope 4 Add Users to a Group