Use this presentation with Section 2 of the Deployment Workbook.

Slides:



Advertisements
Similar presentations
UTILIZING WITH ITA. offers an entire suite of benefits for you and your students. You can also set up s for the purpose.
Advertisements

Quick Start Guide. To setup another account (aside from the school ) 1) Tap “Settings”
Managing Users. Overview for School Admin Users Define Users Users Module Add Users Importing Users and Groups Manually adding users Search for Users.
Members Only & Login Modules Members Only works with the Login module to provide password protection to Web pages and files. Login Groups may be created.
IBM Software Group ® Accessing Domino via Outlook iNotes Access for Microsoft Outlook - Notes Domino 5.5 – Domino Access for MS Outlook - Notes Domino.
Active Directory: Final Solution to Enterprise System Integration
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Important when you launch Yammer Enterprise Create an engaged and trusted community Decide about User Profile Syncs Various User and Admin.
CLUSTER WEBLOGIC SERVER. 1.Creating clusters and understanding its concept GETTING STARTED.
GroupWise Tutorial What is GroupWise? GroupWise is an and calendar service (much like Microsoft outlook) for Collin College faculty and staff.
August 25, SSO with Microsoft Active Directory Presented by: Craig Larrabee.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
ClearPath Hosted MVP Web Portal 1. Log In Page Users are able to access the Web Portal by using their assigned user name and password. Access Web Browser.
SCO Insight Connector Training. The SCO Insight Connector  Product Overview  Technical Specifications  Installation  Using the Components  Target.
Account permissions Iain Ure. Intro The new permissions functionality Groups Users Assign content Data view Questions.
The world’s libraries. Connected. Setup and management of OCLC Services accounts for access to WorldShare ® Interlibrary Loan OCLC Training and Support.
Guide to Operating System Security Chapter 4 Account-based Security.
Chapter 7: WORKING WITH GROUPS
Montcalm Area Intermediate School District Tom Staten – Billy Willis – October 13, 2011 MAEDS Session 8D.
Designing Group Security Designing security groups Designing user rights.
Administrator – Employee Overview September, 2011.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
Computer Science Topical Paper Presentation #15 Zach Sloger The Secure Blackboard Pattern S e c u r e B l a c k b o a r d P a t t e r n – P a.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Riva Managed Identity Integration for Active Directory and Novell ® GroupWise ® Aldo Zanoni CEO, Managing Director Omni Technology Solutions
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Moving/Co-existing your messaging platform to the cloud with Exchange.
Process Content Packs consist of ready-to-use static pre-defined data sets. Packs fill the gap between the OOTB product and a full customized services.
Module 3 Managing Recipient Objects. Module Overview Managing Mailboxes Managing Other Recipients Configuring Address Policies Configuring Address.
Chapter 10: Rights, User, and Group Administration.
Securing Sensitive Information Data Security Dashboards often contain the most important data in the company Securing that information makes business.
Inventory & Monitoring Program SharePoint Permissions Who has access? What can they do with the access? What is the easiest way to manage the permissions?
Integrating Active Directory with eDirectory ™ Using Novell Account Manager Reid Oakes Technical Team Manager Novell, Inc.
Leading firms through the next generation of change™
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Three Managing Recipients.
Digital Library Syllabus Uploader Will Cameron CSC 8530 Fall 2006 Presentation 1.
Module 5: Managing Addresses and Address Lists.
Module 6: Administering Reporting Services. Overview Server Administration Performance and Reliability Monitoring Database Administration Security Administration.
Log into Log into the SPORT NGIN site or create an account if this is your first time in.
Microsoft Exchange Server 2013 Security Mick Tomlinson– Technical Instructor New Horizons.
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 Security Aspects of TPM 7.1.
COEXISTENCE WITH MICROSOFT EXCHANGE SERVER 5.5 Appendix A.
Justin Scheitlin Daisey Fahringer
ClubRunner and Rotary International Database Integration
Welcome to the MyLearningPlan.Com
Microsoft Imagine Academy
iShop Training Module Access & Security
Using Microsoft Identity Manger with SharePoint 2016 to fill the User Profile Sync Gap Max Fritz Senior Systems Consultant Now Micro.
ACTIVE DIRECTORY ADMINISTRATION
Active Directory Administration
Power BI Security Best Practices
New Features in Fulfillment
Domain Matching for BID Association Requests
Microsoft Imagine Academy
IBM Certified WAS 8.5 Administrator
Enterprise security for big data solutions on Azure HDInsight
An introduction to DSpace
Optimizing Efficiency + Funding
New Enhancements in the eLEND Solutions’ Dealer Dashboard
ISAM System Architecture Buthayna Elabdalla & Bao Vuong Spring 2007
ClubRunner and Rotary International Database Integration
Navigating GP Security
Administrator’s Manual
Unit 6 NT1330 Client-Server Networking II Date: 7/19/2016
User Profile Management
iSecurity Password-Reset Training
Module 1.3 Introduction to the HFR Administration Module
Presentation transcript:

Use this presentation with Section 2 of the Deployment Workbook. Provisioning Users Use this presentation with Section 2 of the Deployment Workbook. This presentation is provided by Kryptiq. You may wish to customize it for use in your organization. V 4.13 | June 2012

This section of the workbook explains… The difference between staff users of secure messaging and Portal Administrators How to get the staff users into the system How to get additional Portal Administrators into the system How to efficiently set up privileges and other settings for everyone Different roles for staff, administrators and patients

Key Concepts Users of Secure Messaging and the Portal exist in a shared user database Most staff have NO need to be given the role of Portal Admins – their job is to handle inbound secure messages and adding them as users will be enough If staff are patients of their practice, they should have two separate log-ins First uses their work email address (for when they are working) Second uses a personal email address (for when they are a patient using the portal)

Domains Groups Roles Profiles LDAP Roles Profiles

Domains Domains Automatically Assign Secure Messaging Privileges based upon email domain, after the @ symbol i.e. susan@family.coms Two are Built-in Internal – this is where you enter the email domain that assigns the privileges to your staff who have your email domain All – this is where you assign privileges to all other Secure Messaging users such as patients You could create more domains, but probably will not need to

Groups Groups are used to cluster users together to Give a small group of staff additional privileges Organize users into custom address books We will create groups as needed during deployment A few groups are built-in CareCatalyst Administrators (CC is the old name for Patient Portal) ClinicalMessenger Users (CM is the old name for SM Secure Messaging) Gateway Administrators (SM) – this can be ignored Gateway Users (SM) – this can be ignored

Profiles Used to organize outbound message settings and other preferences Profiles for SM message settings and other items Enable Project team to decide and lock down certain settings Other settings can be setup to be user’s choice Two Built-in Profiles Internal – Automatically assigned to members of the Internal Domain i.e. @familydocs.com Default – Assigned to everyone else including patients You could create more Profiles, but probably not needed

How to get Staff Users in the system For small – medium practices, there are 2 account creation methods Manual entry of user names – best for small-medium practices Send a message method – another option but needs to be monitored

For Large Practices LDAP Integration Automatic internal user creation and username/password sync Microsoft Active Directory with Exchange or Novell eDirectory If Exchange is shared with additional practices, LDAP integration is not an option.

Domains Groups Roles Profiles LDAP Roles Profiles