USER MAKING. HOW IT WORKS MatchMaking IT will create MatchMakings and designate MatchMaking MatchMakers (groups and/or individuals) for each MatchMaking.

Slides:



Advertisements
Similar presentations
GW Introduction to Google Drive Security and Smart Sharing Practices.
Advertisements

XP New Perspectives on Microsoft Excel 2003, Second Edition- Tutorial 8 1 Microsoft Office Excel 2003 Tutorial 8 – Developing an Excel Application.
Once you're logged in to Google Docs, creating and sharing your documents is easy. A few things to remember: Docs you create aren't accessible to.
Members Only & Login Modules Members Only works with the Login module to provide password protection to Web pages and files. Login Groups may be created.
1 Chapter Overview Understanding and Applying NTFS Permissions Assigning NTFS Permissions and Special Permissions Solving Permissions Problems.
1 File systems security: Shared folders & NTFS permissions, EFS (Week 6, Monday 2/12/2007) © Abdou Illia, Spring 2007.
StudyNet Introduction Modules. Homepage News Module Information – Staff View.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Departmental & Resource Accounts in MS Exchange By: Howard Ignal
Group Accounts; Securing Resources with Permissions
COMPREHENSIVE Excel Tutorial 8 Developing an Excel Application.
Excel Services II: Requirements, recommendations, and permissions What you need for Excel Services As explained in the first course in the series, “Excel.
m AUTHOR EXECUTIVE TRACK CONSULTANTMAUIDAN HOLME.
Chapter 8 Printing 1. In COBOL you send data to the printer by writing data to a file. In COBOL, the printer is defined as a file, and it is opened, closed,
Business Optix Library Service – Workflow
Access Control Lists and NTFS Permissions INFO333 – Lecture Mariusz Nowostawski Noria Foukia.
Membership leader training SVWF. How to add members Add children to the database /database/addhttp://
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
Middle States Self-Study Online Resources. Primary Web Resources  Provost’s MSCHE site  Document and Feedback request forms  Secure MSCHE Document.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
The DSpace Course Module – User management and authentication options.
Microsoft ® Office SharePoint ® Server 2007 Training Excel Services II: Requirements, recommendations, and permissions [Your company name] presents:
Wiki Workshop Tech PD.
A Guide to Using Google Docs for Miss Micklos and Mr. Kelly Google Docs.
Managing Site and List Security Module 6. Overview  Understanding Security  Adding Users to Sites  Creating Custom SharePoint Groups  Creating Custom.
 hy-asana hy-asana.
Inventory & Monitoring Program SharePoint Permissions Who has access? What can they do with the access? What is the easiest way to manage the permissions?
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Security Overview Functional security – users, groups, and permissions for sites, lists,
1 Introduction to NTFS Permissions Assign NTFS permissions to specify Which users and groups can gain access to folders and files What they can do with.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
Operating systems What is an operating system? A program that: Controls hardware Controls software Creates an interface between the hardware and the user.
How to run source code For scxml visual editor tool Author : Gui Xun Long
© CGI Group Inc. User Guide Subversion client TortoiseSVN.
WEEBLY 101 MAKING AN AWESOME WEBPAGE. WEEBLY 101 PLANNING A WEB PAGE WHAT WOULD YOU LIKE YOUR PAGE TO LOOK LIKE? EXAMPLES:
ADL Reload Editor ADL ReLOAD (Reusable e-Learning Object Authoring and Delivery) 1. Create or modify SCORM Packages /meta data 2. Add import resources.
Transportation Agenda 19. Transportation Your Role: Designer Designers organize SharePoint content and determine how to display that content Typical tasks.
E-Procurement Solution for the Northern Ireland 1 Contract and Project Management Solution for the Northern Ireland.
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
Excel Tutorial 8 Developing an Excel Application
Introducing, Installing, and Upgrading Windows 7
Core LIMS Training: Project Management
Global offices USA, India, UK
Project Management: Messages
Your Name Proposal Creation Module 5 Your Name
Windchill Customization
Introduction to NTFS Permissions
Welcome! To the ETS – Create Client Account & Maintenance
FEPMIS Acquisition Plan
Understanding Ownership
How to post a discussion through Moodle Room: Your course website home view Click on a Discussion.
הצטרפות לקבוצת DeDemoc
Using Groove Philip S. Vavalides Professor - IT/Networking Guilford Technical Community College Jamestown, NC.
Built by Schools for Schools
Moodle Gradebook Kim Taylor Spring 2018.
Report Creation Marie SHAH 31/01/2017.
User Guide Subversion client TortoiseSVN
Implementing Database Roles in the Enterprise Geodatababse
Towards an easy use of CIRCABC Interest group leader training
Basics to Know and Best Practices to Do
Windows Server 2003 使用者群組管理
Quid Usage.
EasyDITA: Limitations of the Search Function
4CeeD Demonstration Step-by-step demonstration showing creation, uploading, and sharing of research data Timothy Spila, Ph.D. June 4, 2018.
Microsoft Office Excel 2003
Network Locations in Windows 7
Links Launch Outlook Launch Skype Place Skype on Do Not Disturb.
WDEQ ENV-ITE Demo.
Presentation transcript:

USER MAKING

HOW IT WORKS MatchMaking IT will create MatchMakings and designate MatchMaking MatchMakers (groups and/or individuals) for each MatchMaking. MatchMaking MatchMaker (owner) MatchMaking MatchMaker (owner) MatchMaking MatchMaker (owner) MatchMaking Folders and Files Editors Viewers (Visitors) Viewers (aka Visitors) can be added by anyone with MatchMaker or editor access to the MatchMaking MatchMakers can create folders, add content and give editor rights to others Note: IT cannot prevent editors, viewers from being assigned but can remove rights after the fact. The does not contain alerting or workflow to monitor or control at this level TARSTARS

● MatchMaking ○ Assigned by IT at ○ Areas where a user can add content in (these people are known as MatchMakers) ○ A content MatchMaker or group may have access to one or more MatchMakings ○ If a user has no MatchMakings within, they can be invited as a visitor or editor to specific files/folders by a “MatchMaker” of an existing MatchMaking. ● MatchMaker ○ Assigned owner of a MatchMaking: can create and edit content (e.g. folders, add/edit/delete files) ○ Can assign rights to individual files/folders for other users ○ Can invite visitors (view rights only) ● Visitor ○ A user granted rights to view a file/folder by an existing MatchMaker DEFINITIONS (AS THEY WILL BE USED AT ) From a user’s perspective

● What to use TARS for ○ If a MatchMaking has been setup and defined in advance, we can use TARS for authorizing who has “MatchMaker” rights to a MatchMaking ● What we can’t use TARS for ○ Impractical to use for the creation of MatchMakings ○ Who has “edit” access to MatchMakings ■ Not practical: MatchMakers can designate additional editors of specific files/folders. Even if we used TARS for this process, it can be circumvented by MatchMakers. ○ Who has “view” access to MatchMakings ■ MatchMakers and editors within a MatchMaking can give anyone “view” access; this cannot be pre- designated/controlled ○ What content is added to a specific MatchMaking ● Bottom line - there needs to be a lot of “trust” of who is designated as a “MatchMaker” to a MatchMaking TARS Understanding Limitations