Difference between revisions of "Security Group"

From All n One's bxp software Wixi

Jump to: navigation, search
m (Security)
m (Security)
 
Line 43: Line 43:
 
== Security ==
 
== Security ==
  
 
+
This feature is fully described here [[Security_Groups_for_managing_security]]
=== Adding permissions ===
 
 
 
 
 
The rules here are applied in 2 places.
 
* Editing of a Security Group
 
* Addition of member to a Security Group
 
 
 
 
 
==== Functional Access ====
 
 
 
This allows sections and functions to be automatically modified to a user when they are added to a group. The rules are entered as XX-ADD,YYYY-ADD,XX-REM,YYYY-REM 
 
 
 
** XX is the two digit id of a module. 
 
 
 
** YYYY is the four digit id of a section
 
 
 
** ADD will add access to the users.  REM will remove this access from the users.
 
 
 
 
 
A full reference table of the module ids and the section ids is provided here [[The_Modules_and_Sections_of_bxp_(Reference_Table)]]
 
 
 
 
 
 
 
==== Content Access ====
 
 
 
 
 
This allows Content to be automatically modified by a group of users when they are added to the group.  The rules are entered as TYPE-ID-ADD,TYPE-ID-REM
 
 
 
** TYPE is a keyword for the "content access keyword" listed as per [[Bxp_Security_-_Content_Management]].
 
 
 
** Id is the numeric id for the content available from the various modules.
 
 
 
** ADD or REM will add or remove the content types appropriately
 
 
 
 
 
 
 
=== Removing permissions ===
 
 
 
 
 
There are two places where this is an option
 
 
 
* Deleting of a Security Group (rules are reversed)
 
* Removal of a member from a Security Group (rules are reversed)
 
 
 
 
 
There are four options presented in these two places.
 
 
 
* Do not reverse access
 
* Reverse only Functional Access
 
* Reverse only Content Access
 
* Reverse all access
 
 
 
If permissions are granted through another group, removal will override the other groups permissions.  The preferred option should be "Reverse only Content Access".
 
  
 
==HRM (Human Resources Management)==
 
==HRM (Human Resources Management)==

Latest revision as of 20:15, 16 March 2018

1 Overview

A Security Group is a leaf in the Organogram of a company Organogram_with_Group_Profiling


A Security Group allows you to specify a business unit and then perform a number of actions with that group.


Often Groups start at a broad level all the way down to teams of 1 to 4 people.


Groups are also used to create logical units of people associated with the business or clients who have log ins to your bxp system.


2 Attached data

It is possible to store a lot of information with a Security Group.


securitygroup 001.png


2.1 Details

  • Name : This is how the group will be represented through the system
  • Parent Group : All first level entries will belong to the "Everyone" group and then spread outwards from there.
  • Manager : Is a bxp user account primarily responsible for the group.  This allows HR functions to be more easily managed.
  • Assistant Manager : Is a bxp user account which has the same permissions to perform functions as the manager for HR related updates.


2.2 Classification

  • Sort Order : By default the system will sort alphabetically on name but a custom sort order can be applied.
  • Icon : It is possible to specify an image with the security group.  If you use a number one of the system default icons will be displayed or you can use a URL to specify the image
  • TOM - Roles : Another TOM model.  Roles are added as ID-X,ID-X  Where ID is the ID of the role and X is the FTE amount of that role required.


2.3 Security

This feature is fully described here Security_Groups_for_managing_security

2.4 HRM (Human Resources Management)

  • ESS Details : Allows for a custom layout for dealing with people from this Security Group when managing them through the Security Group Manager section in the HR module.
  • ESS JavaSript : The JavaScript for the above ESS Details
  • HR fields : When listing users in this Security Group in HR reports this overriding list of HR fields can be applied.


3 Use of Security Groups

3.1 To view your current structure

Main Menu > System Access Management > Security Group Management > Organogram with Group Profiling >


Each of the branches are clickable to allow you to review the users in that branch of the tree.


The display will also show all the branches and their members.


3.2 To add a Security Group / Branch

Main Menu > System Access Management > Security Group Management > Security Group - Add >


  • Give your security group / branch a unique name.
  • Choose the parent to attach it to


Below is a display of the current structure to serve as a reminder.


3.3 Profile a User

If you want to see what Security Groups / Branches a user is in the this report makes it easy to see.


Main Menu > System Access Management > Security Group Management > Profile a User >


3.4 To associate users with a Security Group / Branch

Main Menu > System Access Management > Security Group Management > Add User to a Security Group >

  • Choose the group
  • Choose the users
  • Click "Continue"


4 Security Groups for Forms

There are statistic reports for forms in the Data Profiling that need a Security Group allocated to the form.  Form access is managed on a user by user basis for the most granular level control possible.  However for quick group reporting a security group can be associated with the form.  This association does not change form content access permissions.