Note:
Changes made to the user groups, templates, transactions and actions will NOT become operationally effective until all users affected by these changes have been PROPAGATED (refer to Propagate User Changes). (The users affected by the changes will have been flagged as requiring propagation.)
The security system is one of the two vital components that drive the systems application.
This component is necessary to set up the relevant profiles of the users of the system, and to determine how these users will utilize its functionality.
The use of the security system will be restricted to a designated person (Access Controller) whom the business has identified. Because the effective administration of the system depends to a great extent on the services that are set up in this component, the Access Controller will be a specialist, and not the daily user of the system.
This component allows the access controller to:
- define the users who will be grouped into user groups
- define any user groups that will require access to certain services
- assign specific user groups to individual users
- assign user groups to specific templates