Security
Section 12.5 Security Policy
Section 12.5 Creating a Security Policy Administrators can create a security policy for a user or a role. Components of a Policy include the level (user/role), accessibility settings (group/user/role), and action settings. Each Security Policy must ...
Section 12.4 Users
Section 12.4 Users A user is associated with an access license (UAL). They are not shared by Users; each User must have their own UAL. Once a User has their own UAL, it does not matter how many machines they log in from. Users are assigned a Role and ...
Section 12.3 Groups
Section 12.3 Groups A group of users is given access to work areas (scope of projects/collections) that all need access to the same resources. Groups can be created based on individual users who all need access to certain resources or based on global ...
Section 12.2 Users, Groups, Policies, and Scopes Organizational Chart
Section 12.2 Organizational Chart of Users, Groups, Policies, and Scopes Section 12.2.1 Security Quick Start Reference 1 Create a Policy 2 Create a Scope 3 Add a Policy to a Group and assign the scope 4 Add Users to a Group
Section 12.1 Password Policy
Section 12.1 Password PolicyA password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. The computer system will force users to follow the password policy. WIBâ„¢ ...
Section 12 Security Management
Security Management Security Management allows Administrators to set up users or groups, and policies and scopes, which, combined, become a Security Policy Definition (SPD). Policies are vital for keeping proper access rights to your most sensitive ...