Section 12 Security Management

Section 12 Security Management

Security Management

Security Management allows Administrators to set up users, groups, and roles which combined become a Security Policy. Policies are vital when it comes to keeping proper access rights to your most sensitive data. The ability to group users into sets to assign levels of permissions (a Policy) is incredibly useful for keeping a policy of least privilege. Policies are complex and are applied to enable users to access and change data.

A group is a collection of users with a given set of permissions assigned to the group (and transitively, to the users). A role is a collection of permissions, and a user effectively inherits those permissions when he acts under that role.

A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. The computer system will force users to follow the password policy. WIB™ Review has a strict password policy that is NIST compliant. For more information regarding the Password Policy please contact support@radixdata.com.

Section 12.2   Organizational Chart of Users, Groups and Roles

 

Section 12.3   Groups

A group of users are given access to work areas (projects/collections) that all need access to the same resources. Groups can be created based on individual users that all need access to certain resources, they can be created based on global groups (such as departments: accounting), business function (accounts payable or accounts receivable), or workflow process function (invoice approval).

Section 12.3.1                  Create a New Group

Using the Navigation Tree, select Users>Groups>Roles. Tabs for Users, Groups, and Roles contain tables that show the information related to each security level. Select the Groups tab to view a list of groups and the associated users and roles assigned to the Group. Select Add New to create a New Group. You can edit, delete, or view the group settings by highlighting the group and selecting edit, delete, or details, respectively.

Section 12.3.2                 Group Properties

Section 12.3.2.1            Access to PPI/PII

By default, access to PPI/PII is turned off for users, groups, and roles. To allow a group of users to access PPI/PII turn on the access.

Section 12.3.2.2           Group Name

Give the Group a name that is descriptive. A department (Operations), business function (Accounts Payable) or processing function (Reviewers) are examples of good group names.

Section 12.3.2.3           Group Role(s)

Roles define permissions (actions) that users assigned to that role can perform. A Role is defined at the workspace level and is restricted to performing actions when assigned to a group for work areas that fall under the umbrella of the group permissions.

Section 12.3.2.4           Group User(s)

Users can be assigned directly to a group. The user will keep the permissions granted to the user or the role the user is assigned to. The user will then be granted access to work areas under the group data policy. Users can belong to multiple groups. Users that are assigned to a role will also appear as members of a group when the role is added to the group.

Section 12.3.2.5           Group Security Policy

A group level security policy defines which work areas those roles or users assigned to the group have access to. Permissions for actions are defined at the Role or User level.

Section 12.3.2.5.1                Data Policy

A Group Data Policy grants access to work areas in the workspace. Roles can be inherited in the group policy OR can be defined separately. If a Role has a data policy defined the Role Data Policy overrides the Group Data Policy.

Section 12.4   Roles

A security role is a collection of privileges in a workspace. Users can be assigned to a role and inherit the permissions defined in the role. Roles can be added to groups and will be restricted to performing the actions defined by the role in the specific work area(s) defined by the group data policy. Roles can have overriding data policies. Refer to Security Policy for instructions on setting up a Role level data policy.

Section 12.4.1                  Creating a New Role

Using the Navigation Tree, select Users>Groups>Roles. Tabs for Users, Groups, and Roles have tables that show the information related to each security level. Select the Roles tab to view a list of roles and the associated users assigned to the role and the groups the role is assigned to. Select Add New to create a New Role. You can edit, delete, or view the role settings by highlighting the group and selecting edit, delete, or details, respectively.

Section 12.4.1.1             Access to PPI/PII

By default, access to PPI/PII is turned off for users, groups, and roles. To allow a group of users to access PPI/PII turn on the access.

Section 12.4.1.2            Role Name

Give the Role a name that is descriptive. A Role is like a job title. Examples include Administrator, Project Manager, Reviewer, Approver.

Section 12.4.1.3            Groups

You can assign a role to a group from the New Role or Edit Role Menu(s). The Role will inherit the data policy of the Group it is assigned to unless you configure the data policy for the Role. A Role Data Policy will override a Group Data Policy. Refer to Creating a Security Policy for instructions on setting up a Role level data policy.

Section 12.4.1.4           Users

Assign Users to the Role. This allows you to set the policy one time for many users. You can set up a separate policy for users. Refer to Security Policy for instructions on setting up a User Level Policy.

Section 12.5   Users

A user is associated with an access license (UAL). They are not shared by Users; each User must have their own UAL. Once a User has their own UAL, it does not matter how many machines they log in from. Users are assigned a Role and are part of a Group. Users can have a separate Security Policy that limits or grants added privileges beyond their defined Role or Group.

Section 12.6  Creating a Security Policy

Administrators can create a security policy for a user or a role. Components of a Policy include the level (user/role), accessibility settings (group/user/role), and action settings. Each Security Policy must address all areas of WIB Review: who can access each area, what actions are allowed and to whom or which role/user the policy applies.

Section 12.6.1                  Policy Name

Name the policy in such a way that it describes either the role or an individual user’s job function. It is suggested the Policy Name is Different than the Role or Username as staff and responsibilities change over time and you want the Policy to reflect the functionality of the policy which will persist over time. You can change the name of the policy.

Section 12.6.2                 Assign the Policy

You must assign the Policy to a specific user or a role. If you access the Policy from a Role or User, the Policy Summary will populate with the User or Role the Policy is assigned to.

Section 12.6.3                 Security Policy Stepper (Roadmap)

The Security Policy Stepper guides the administrator through the process of defining a Security Policy.

Section 12.6.4                 Security Policy Definition (SPD) (Roadmap)

The Security Policy must define which actions roles and/or users are allowed to perform for all the features.

Section 12.6.4.1           Dashboard SPD

Section 12.6.4.1.1                Dashboard Page Accessibility

You can restrict access to the Dashboard. If you do not want the user or a set of users, referred to as “users”, with a particular role to access the Dashboard in its entirety, then turn off Page Access. If they have access, you must define what actions they (the users) are allowed to perform.

Section 12.6.4.1.2               Dashboard Page Actions

Each Page in WIB Review has actions that can be performed that are specific to the page or a section of the page.

Section 12.6.4.1.2.1    View

Users are only allowed to view the dashboard. They cannot customize the dashboard.

Section 12.6.4.1.2.2    Design

Allows the user to customize the dashboard. Report Tiles can be added to the dashboard, resized, and organized to the user’s preference. Refer to Reports to create and save a report. Users can add private or public reports to the dashboard.

Section 12.6.4.1.2.3    Print

Users can print a dashboard to a PDF for sharing.

Section 12.6.4.1.2.4   Export

Users can export a dashboard to a PDF or to an excel spreadsheet. The report metadata and the chart can be exported. The chart is exported as a picture and will no longer dynamically update if any metadata supporting the report is changed.



    • Related Articles

    • Section 10 Configuration Management

      Configuration Management Configuration Manager allows you to create attributes, setup the automation and workflow for a project. Configuration Management allows you to configure the systems settings to reach product optimization and because changes ...
    • Section 11 Data Management

      Data Management Data Management allows administrators to watch sessions and keep data synchronized with changes to the configuration by rebuilding data at various levels. Section 11.1 Data Management Monitoring Levels Data Management is organized by ...
    • Section 9 Project Management

      Project Management A Project holds the overall design of the system. This area allows the Workspace Administrator to manage Projects and their parts (entities). A Project has the following entities: collections, attributes, automation, and workflow. ...
    • Section 9.1 Project Management Overview

      Section 9.1 Project Management Overview The overview simply informs the user about the specific area of the website. The overview also has a link to a wizard and quick links to other entities that need to be configured before creating a Project.
    • Section 12.6 Security Policy

      Section 12.6 Creating a Security Policy Administrators can create a security policy for a user or a role. Components of a Policy include the level (user/role), accessibility settings (group/user/role), and action settings. Each Security Policy must ...