A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. The computer system will force users to follow the password policy. WIB™ Review has a strict password policy that is NIST compliant. For more information regarding the Password Policy please contact support@radixdata.com.Section 12.2 Organizational Chart of Users, Groups and Roles
Section 12.2.1 Security Quick Start Reference1 Create a Policy2 Create a Scope3 Add a Policy to a Group and assign the scope4 Add Users to a Group
Section 12.3 Groups
A group of users is given access to work areas (scope of projects/collections) that all need access to the same resources. Groups can be created based on individual users who all need access to certain resources or based on global groups (such as departments: accounting, business function (accounts payable or accounts receivable), or workflow process function (invoice approval).
Section 12.3.1 Create a New Group
Using the Navigation Tree, select Users>Groups>Policies>Scopes. Each section contains tables showing information for each security level. Select the Groups tab to view a list of users and Policies assigned to the Group. Select Add New to create a New Group. You can edit, delete, or view the group settings by highlighting the group and selecting edit, delete, or details, respectively.
Section 12.3.2 Group Properties
Section 12.3.2.1 Group Name
Give the Group a descriptive name. Some examples of good group names are A department (Operations), a business function (Accounts Payable), or a processing function (Reviewers).
Section 12.3.2.2 Group User(s)
Users can be assigned directly to a group. The user will keep the permissions granted to the user. The user will then be granted access to work areas under the group scope. Users can belong to multiple groups.
Section 12.3.2.3 Group Security Policy
A group-level security policy defines which portal areas (Policy) and project or collections (Scopes) the users assigned to the group have access to.Section 12.3.2.5.1 Data Policy
A Group Data Policy grants access to work areas in the workspace. Roles can be inherited in the group policy, or can be defined separately. If a Role has a data policy defined, the Role Data Policy overrides the Group Data Policy.
A user is associated with an access license (UAL). They are not shared by Users; each User must have their own UAL. Once a User has their own UAL, it does not matter how many machines they log in from. Users are assigned a Role and are part of a Group. Users can have a separate Security Policy that limits or grants added privileges beyond their defined Role or Group.Section 12.5 Creating a Security Policy
Administrators can create a security policy for a user or a role. Components of a Policy include the level (user/role), accessibility settings (group/user/role), and action settings. Each Security Policy must address all areas of WIB Review: who can access each area, what actions are allowed and to whom or which role/user the policy applies.
Section 12.5.1 Policy Name
Name the policy in such a way that it describes either the role or an individual user’s job function. It is suggested that the Policy Name be different from the Group or Username, as staff and responsibilities change over time, and you want the Policy to reflect the functionality that persists. You can change the name of the policy.Section 12.5.2 Security Policy Definition (SPD)
A Security Policy definition is comprised of Policies and Scopes, which are applied to a User or a Group of Users. Go to Policies\Overview and select New. You will be prompted to select either Wizard or Design View to create the new policy.
Section 12.5.2.1 Security Policy Wizard
The Wizard walks you through each page of the portal and guides you through the sections and actions available to users. Take into consideration the job functions of the group or user you are creating a policy for, and assign which areas of the portal they should have access to and what actions they are permitted to take.
Section 12.5.2.2 Security Policy Design View
You are not required to use the Wizard; you can also create a Policy in Design view. You can toggle from the Wizard to Design view using the button in the right corner of the Wizard stepper.