Configuring Security in RiteTrack3 Webinar, March 28 th, 2008 Jim Drever, Marketing Director Justin Olson, Deployment Manager.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Questions with 2nd Request Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Advertisements

Omni eControl: Unified management console for multiple applications
Handel Users Group 2008 Conference Meeting Moderator: Jim Drever.
Managing User, Computer and Group Accounts
Informer Security PRESENTER: Tim Nicholson | | March 5-6, 2012.
Chapter Five Users, Groups, Profiles, and Policies.
ADDING AND MANAGING USERS. Addresses Every user account must have an address The address is used by NHS Jobs to communicate with the user.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
1 Chapter Overview Understanding and Applying NTFS Permissions Assigning NTFS Permissions and Special Permissions Solving Permissions Problems.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Michael Donovan, River Campus Libraries – 12/03 DocuShare Overview and Training.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 6: Configure and Troubleshoot Local User and Group Accounts.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Protect your data with Security John Ykema, Director of Sales & Marketing.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
SharePoint PREP Administration Chris Felknor MIT iCampus
ShelterPoint™ Data-Entry Workflows. ShelterPoint v5.2.3.
Entity Administrator Training Working with ADEConnect & Entity Admin Portal ADEConnect.
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
Quick Start Guide: Administrator Advanced Learn about: 1.Creating customized Roles in LOAMS 2.Searching and moving users in the hierarchy 3.Modifying accounts.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
Quick Start Guide: Administrator Basics Learn about: 1.Adding users to the LOAMS system 2.How to modify or delete existing users 3.How to reset passwords.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Administrator – Employee Overview September, 2011.
By BuilderMT BMT Cloud Models and Options Manager by BuilderMT Using Cloud MoM to build and manage a Builder’s Model & Option database BuilderMT Cloud.
Understanding Group Policy James Michael Stewart CISSP, TICSA, CIW SA, CCNA, MCSE NT & W2K, iNet+
Module 3: Administrator Set-Up Intuit Financial Services University Internet Banking Certification Training.
The New MR Repository & Security Authorization Model Ben Naphtali WebFOCUS Product Manager Architecture and Security May 2010 Copyright 2009, Information.
Setting up/Managing Bank Personnel Intuit Financial Services University Business Financial Solutions Certification.
Chapter 10: Rights, User, and Group Administration.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Week 4 Objectives Overview of Group Policy Group Policy Processing Implementing a Central Store for Administrative Templates.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Administrator Data Entry Training for Maintenance (Mx) LOSA and Ramp LOSA Database Software 11/26/2016.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
Chapter4 Part2. User Account Management Once Active Directory is installed and configured, you enable users to access network servers and resources through.
10.1 © 2004 Pearson Education, Inc. Lesson 10: Specifying Group Policy Settings Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Labcheck Next Generation Quick Start Guide Admin Basics.
Please wait, Our presentation will be starting soon. Use Alt+Tab key to go to other applications while the presentation is running. Use Esc key to stop.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Project Management: Messages
Assignment # 8.
Welcome! To the ETS – Create Client Account & Maintenance
iShop Training Module Access & Security
How to assign a test Project Name: How to assign a test Description:
TOPSpro Special Topics
Presented by [Harshit Agrawal] 03/02/2017
Management Reporter Tips and Tricks.
To Join the Teleconference
RFPMonkey.com External Review
Improved UI/UX Right Click menu becomes pencil button & settings (category are here) Description included in the action panel – remove management panel.
Manage your Interest Group
Riding the Wave of Innovation
Figure 6-9: Managing Users and Groups
Administering Your Network
La Crosse Interstate Fair – Online Entry Process
self-paced eLearning series
Administration Module
Adding members to ArcGIS Online
Chapter 9: Managing Groups, Folders, Files, and Object Security
February 11-13, 2019 Raleigh, NC.
Smart Cookies – Troop Secured Booths
Module 8: Implementing Group Policy
Smart Cookies – Troop Secured Booths
SOP of System Security Settings
Setting up home folders and roaming profiles
Presentation transcript:

Configuring Security in RiteTrack3 Webinar, March 28 th, 2008 Jim Drever, Marketing Director Justin Olson, Deployment Manager

Our Agenda What is the Admin Tree (useful if you are new to RiteTrack 3) Go Through the trees nodes Discuss how basic security works Make an events details invisible to a group Conclude with questions and topic ideas for the next webinar

The Tree You have to have Administrative rights There is no extra password protection Lets go see

Four Node Types Users – Manage individual users Security Groups – set group policies Organization Configuration Lock Types

Users node Each User (someone with a log in into RT) – Selecting a user lets you edit their account (passwords, anyone?) SubNodes of Each User – Groups – Which Group are they part of? Assign a user to a group. Instead of setting up each person, set up the security for the group – Tree Views – What trees does a user get to see (note the admin tree?)

Security Groups This is where we set up most of the security Select the Group (right click will make a new one) and let look at that form – Name – Description – Priority – When a user has several, which should have priority… Administrator is usually 1 – Active – Group Users (from assigning users in user node)

A Quick Look

View Permissions (Under Group) Give basic read, write, create and delete permissions to specific presentation objects Use Global to give or deny permission to all objects of a specific type (e.g., all forms) Use global first, the assign specifics if needed

Entity Permissions Add permissions to entities for specific security group Use for relational security For example, a group can only see clients they manage and no others Please let Handel set this up for now, as it does require some database set up

Function Permissions Add/Delete Function permissions - for example drag and drop functionality

Policies Add policies to a specific group Set a property for a specific control (e.g., disable SSN for a specific group) Handel staff configure policies before setting in administrator

Tree Views Add or remove default tree views Inherit tree views when adding a user to a security group

Lock Type Override When Events are closed and other items are locked, these enable them to be unlocked for groups Disable closed and signed events Give administrators access to specific forms on signed or locked events If no row exists for a specific lock type, then the object will be LOCKED for the security group.

Lock Types (Organizations in a Sec) The last part we looked at in setting up security for lock type overrides gets the lock types from here Developed with configuration to show here

Organizations Regular settings, Lets take a quick look…

Basic Hierarchy There are multiple groups at an organization Administrator Group (always) User Groups Sometimes (many) more A user can be part of more than one group Security is based on the priority of that group (remember the Security Group form?)

Lets Pretend… We are an Indian tibe We have enrollment Supervisors maybe some should or shouldnt have access to details In this case, lets look at The name of this event in this database is enrollment

Let Us Set This Security Up Several groups CAN be exactly the same EXCEPT the Intake should have limited access to the enrollment event. Let us change this in our current system:

Finally, Future Webinar Topics? Lets hear them Or, Next Webinar Date: July 8 th, 2008 – (I will you beforehand)

Thanks!