Changes

Jump to: navigation, search

UTA Security Matrix

1,633 bytes added, 20:45, 11 July 2019
no edit summary
==Enabling the Security Matrix=={{Banner-UnderConstruction}}
Once you have created your [[Universal Tracking Application]] you may want to restrict interaction with the [[Applications|application]] and the associated [[Entity|entities]]. In order to do this you will need to enable the '''Security Matrix''' feature.
You should only enable this ==Overview==The '''Security Matrix '''feature when in your [[SmartSimple]] [[instance]] allows you have completed to restrict [[User|user]]'s interaction with the [[Universal Tracking Application|Universal Tracking Applications]] in your system and the entire associated [[entities]] with each application, as it may become very difficult . The '''Security Matrix '''allows you to work define how users can interact with each level of the data in an application once this security is switched , based onthe way that they need to interact with data. You must enable the '''Security Matrix '''and permission each [[User Role|role]] to have varying levels of accessibility to the [[Universal Tracking Application]]. 
The '''Security MatrixNote: ''' is configured from the You must have [[Global User Administrator|System Administrator]] privileges in order to enable the '''ConfigurationSecurity Matrix.''' page.
1==Configuration - Essentials=====Enabling the Security Matrix===Your first step is to create the [[Universal Tracking Application|Universal Tracking Applications]] for your system. Click the If and once these have already been created, you may then enable the '''SettingsSecurity Matrix ''' tabfeature to ensure that the levels of access dependent on [[User Role|user role]] are properly secure and permissioned. 
21. Click Open the [[{{UTA Settings - Security|Security tab]]}} whose security you would like to permission.
The 2. Click the '''Security Matrixgear icon ''' setting is displayed on the top left of the UTA page in the order to enter its '''Security Configuration Settings.'''.
:: [[ImageFile:SecurityMatrixSettingUTA configuration.png|link=]] 3. Click the into the '''Enable Security MatrixSecurity ''' check boxtab.
4. Click the Toggle on the '''SaveEnable Security Matrix ''' buttonoption. 
The 5. A '''Security MatrixMatrix ''' link is added to the top of the ''''Security Settings''' windowhyperlink will then appear below. As soon as the security matrix is enabled, all [[User|users]] will lose all access to data within the application until the permissions are establishedClick this hyperlink.
:: [[File:UTA security matrix.png|500px|border]] 
<pre>As soon as the Security Matrix is enabled, all users will lose all access to data within the application until the role-specific permissions are established. </pre>
 
===Setting Role-Based Security Permissions===
The next step after clicking into the '''Security Matrix''' hyperlink is to specifically choose which roles will have which security permissions with this {{UTA}}.
 
The {{UTA}} '''Security Matrix''' page will appear with a top row of tabs that lead, chronologically, to the security matrices of the {{L1}}, {{L2}}, and {{L3}} entities in that UTA (if more than a {{L1}} entity is applicable).
 
:: [[File:Security matrix grant manager 2019.png|thumb|none|800px|Grant Manager Security Matrix example, with tabs for L2, L2, and L3 entities]]
In each security matrix is a list of the respective UTA [[User Role|user roles]], followed by these column headings: '''Access''', '''Deny''', '''View''', '''Add''', '''Edit''', '''Delete''', and '''Assign.'''
 
:: [[File:Security matrix budget manager column headings.png|thumb|none|1200px|Security Matrix column headings in list view.]]
5. Choose the [[roles]] that should have access to the application in the [[UTA_Settings_-_Security#Access_Role_Settings|Access Role Settings]] box. Only the roles added to [[UTA_Settings_-_Security#Access_Role_Settings|Access Role Settings]] are made available to be configured in the Security Matrix.
 
6. Click the ''Save'' button again.
 
7. Click the '''Security Matrix''' link.
 
The Security Matrix window is displayed.
 
[[Image:SecurityMatrix.png|link=]]
==How the Security Matrix works==
 
* The current view is for security associated with the Grant level ({{l1}}).
==Role Engagement==
All access is [[Role|role]] based. Each set of access permissions can be set based on the following role engagement:
All access is [[Role|role]] based. Each set of access permissions can be set based on the following role engagement:
* '''All''' – All [[User|users]] in this [[Role|role]] can perform the permissioned actions.
* '''Owner''' – Only a [[User|user]] in this [[Role|role]] associated through the "Owner" standard field can perform the permissioned actions.
==Permission Types==
The following six permission types are available:
The following six permission types are available:
* '''Deny''' - Users in this role are denied access to this item.
* '''View''' – View the item.
==Setting the Security Matrix==
 
1. Set the '''permissions''' as shown below:
[[Image:SecurityMatrixExample.png|link=]]
* All Employees can view all items.
* Only the Employee assigned as the "Owner" of a given record can view, add, edit, delete and assign other people to that record.
[[Image:SecurityMatrixL2.png|link=]]
4. Set the permissions the same as for the Level 1 items.
{{PrevNextStart}} [[Calculating Information between Levels]]{{PrevNextMid}} [[Reader Logs]] {{PrevNextEnd}}
[[Category:Universal Tracking Application]][[Category:Security]]
2,299
edits

Navigation menu