Changes

Jump to: navigation, search

UTA Security Matrix

688 bytes added, 15:23, 14 December 2022
Setting Role-Based Security Permissions
==Overview==
The '''UTA Security Matrix '''feature in your [[SmartSimple]] [[instance]] allows you to restrict [[User|user]]'s interaction with the [[Universal Tracking Application|Universal Tracking Applications]] in your system and the associated [[entities]] with each application. You The '''Security Matrix '''allows you to define how users can interact with each level of the data in an application, based on the way that they need to interact with data. You must enable the '''Security Matrix '''and permission eacheach [[User Role|role]] tot to have varying levels of accessibility to the [[Universal Tracking Application]]. 
'''Note: '''You must have [[Global User Administrator|System Administrator]] privileges in order to enable the '''Security Matrix.'''
==Configuration - Essentials= ====Enabling the Security Matrix===
Your first step is to create the [[Universal Tracking Application|Universal Tracking Applications]] for your system. If and once these have already been created, you may then enable the '''Security Matrix '''feature to ensure that the levels of access dependent on [[User Role|user role]] are properly secure and permissioned. 
2. Click the '''gear icon '''on the top left of the UTA page in order to enter its '''Configuration Settings.'''
:: [[File:UTA configuration.png]] 
3. Click into the '''Security '''tab.
:: [[File:UTA security matrix.png|500px|border]] 
<pre>As soon as the Security Matrix is enabled, all users will lose all access to data within the application until the role-specific permissions are established. </pre>
<pre> As soon as the Security Matrix is enabled, all users will lose all access to data within the application until the role-specific permissions are established. </pre>  ===Setting Role-Based Security Permissions===The next step after clicking into the '''Security Matrix''' hyperlink is to specifically choose which roles will have which security permissions with this {{UTA}}.
[[Image:SecurityMatrixSettingThe {{UTA}} '''Security Matrix''' page will appear with a top row of tabs that lead, chronologically, to the security matrices of the {{L1}}, {{L2}}, and {{L3}} entities in that UTA (if more than a {{L1}} entity is applicable).png|link=]]
3:: [[File:Security matrix grant manager 2019. Click png|thumb|none|800px|Grant Manager Security Matrix example, with tabs for L2, L2, and L3 entities]]In each security matrix is a list of the respective UTA [[User Role|user roles]], followed by these column headings: '''Access''', ''Enable Security Matrix'Deny'' check box. 4. Click the ', ''Save'View'' button. The ', ''Security Matrix'Add'' link is added to the top of the ', '''Security SettingsEdit''' window. As soon as the security matrix is enabled, all [[User|users]] will lose all access to data within the application until the permissions are established. 5. Choose the [[roles]] that should have access to the application in the [[UTA_Settings_-_Security#Access_Role_Settings|Access Role Settings]] box. Only the roles added to [[UTA_Settings_-_Security#Access_Role_Settings|Access Role Settings]] are made available to be configured in the Security Matrix. 6. Click the ''Save'Delete''' button again. 7. Click the , and '''Security MatrixAssign.''' link.
:: [[File:Security matrix budget manager column headings.png|thumb|none|1200px|Security Matrix column headings in list view.]]
Choose the [[roles]] that should have access to the application in the [[UTA_Settings_-_Security#Access_Role_Settings|Access Role Settings]] box. Only the roles added to [[UTA_Settings_-_Security#Access_Role_Settings|Access Role Settings]] are made available to be configured in the Security Matrix.
Click the ''Save'' button again.
Click the '''Security Matrix''' link.
The Security Matrix window is displayed.
 [[ImageFile:SecurityMatrixSecurity Matrix Example.png|link=800px|border]]
==How the Security Matrix works==
* '''Owner''' – Only a [[User|user]] in this [[Role|role]] associated through the "Owner" standard field can perform the permissioned actions.
* '''Assigned''' – Only [[User|users]] that are assigned to the item - either in the "Assigned" standard field or assigned as a contact with this role - can perform the permissioned actions.
* '''AccountsOrganizations''' – Only [[User|users]] in this [[Role|role]] that are associated with organisations organizations assigned to this item can perform the permissioned actions. This is an indirect permission. For example, if you were to associate a company with a project and use this permission, then someone from that company with this [[Role|role]] would be able to perform the permissioned actions.
* '''Person''' - Only [[User|users]] in this [[Role|role]] associated through the "Person" standard field can perform the permissioned actions.
Smartstaff
282
edits

Navigation menu