Lesson 3: Managing User Access and Security (Cache Administrators only)

Slides:



Advertisements
Similar presentations
Author: Julia Richards and R. Scott Hawley
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 3.1 Chapter 3.
1 Chapter 58 - Clinical Syndromes of Metabolic Alkalosis Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 7 Author: Julia Richards and R. Scott Hawley.
1 Chapter 43 - The Urine Concentrating Mechanism and Urea Transporters Copyright © 2013 Elsevier Inc. All rights reserved.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 14.
Michigan Electronic Grants System Plus
Instructions for Creating Data Sharing Permissions in PEMS.
© Tally Solutions Pvt. Ltd. All Rights Reserved 1 Control Centre December 09.
Copyright © Questionmark Corporation and/or Questionmark Computing Limited, known collectively as Questionmark. All rights reserved. Questionmark.
Expanded Credit Checking A Feature of D-Plus An Enhancement For iSeries 400 DMAS from Copyright I/O International, 2009 Skip Intro.
INTRODUCTORY MICROSOFT ACCESS Lesson 1 – Access Basics
©2012 Microsoft Corporation. All rights reserved..
User Query Control An Enhancement For AS/400 Query On The IBM iSeries from  Copyright I/O International, 2005 Skip Intro.
1 Welcome to JCCAA Data base presentation Click box to see the DEMO 1.JCCAA Web Site 2. Member Login 3. My Acount 4. School DBA The end.
Cisco Confidential 1 © Cisco and/or its affiliates. All rights reserved. Last Updated: April 2014 Instructions for Navigating in the Training.
Lesson 9: Managing Inventory
EmpowHR EmpowHR Security Overview. 2 Application Security Administration Permission List Roles User Profiles Row level security Distributed Security Administration.
Lesson 25: Task Management Seeing how tasks to accomplish activities are defined and viewed.
1 Introduction to OBIEE: Learning to Access, Navigate, and Find Data in the SWIFT Data Warehouse Lesson 3: SWIFT Data Warehouse Security This course, Introduction.
ShelterPoint™ Data-Entry Workflows. ShelterPoint v5.2.3.
© Copyright 2013 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Basic Administrator Training – Release Adding Users.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Lesson 10: Move Tasks and Ad Hoc Moves Move Materials from one location to another.
Lesson 2: Modeling Participants (Cache Administrators only)
Lesson 12: Kitting and De-Kitting
9 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
7 Copyright © 2004, Oracle. All rights reserved. Administering Users.
Training Role Module 8 – User Admin Ver. 10 Oct 2009.
1 Copyright © 2004, Oracle. All rights reserved. Introduction.
Lesson 14: Incident and Other Issues. Copyright 2002 Sterling Commerce, Inc. All rights reserved. 2 Create Incident Issue.
Lesson 28: Counts Performing counts and resolving variances.
Lesson 20: Receiving Returns Steps to Process and Complete Returns.
Lesson 21: Refurbishing Items Steps to Process Refurbishment.
Lesson 1: ICBS-R Application Overview. Copyright 2002 Sterling Commerce, Inc. All rights reserved. 2 Agenda WMS Concepts Modeling Participants Managing.
2. SQL Security Objectives –Learn SQL Server 2000 components Contents –Understanding the Authentication Process –Understanding the Authorization Process.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Security Overview Functional security – users, groups, and permissions for sites, lists,
Lesson 11: : Inbound Purchase Orders & Requisitions.
23 Copyright © 2009, Oracle. All rights reserved. Oracle Business Intelligence Answers: Advanced Features.
Administrator Data Entry Training for Maintenance (Mx) LOSA and Ramp LOSA Database Software 11/26/2016.
HOW TO SETUP USERS 2014 v1.0. System Setup – My Settings 2 Click Setup 11 Under System Setup, My Settings enables you to change your Password or reset.
8 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. BI Publisher Server: Administration and Security.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
Copyright © 2007, Oracle. All rights reserved. Implementing Role-Based Security.
1 Copyright © 2008, Oracle. All rights reserved. I Course Introduction.
8 Copyright © 2004, Oracle. All rights reserved. Making the Model Secure.
Staff Module and Summary of Changes 1. Icon Changes: Page 3 Signing In and Password/Pin Changes: Page 4 Logging Out: Page 8 Staff Module Changes: Page.
Module 3: Managing Groups. Overview Creating Groups Managing Group Membership Strategies for Using Groups Using Default Groups.
Module 6: Administering Reporting Services. Overview Server Administration Performance and Reliability Monitoring Database Administration Security Administration.
DataDirector 3.0 Permissions Enhancements. Permissions - Overview  A new robust, user-friendly system of permissions has been implemented within DataDirector.
1 Chapter Overview Understanding Shared Folders Planning, Sharing, and Connecting to Shared Folders Combining Shared Folder Permissions and NTFS Permissions.
29 Copyright © 2009, Oracle. All rights reserved. Administering the Oracle Business Intelligence Presentation Catalog.
Lesson 23: Generating Reports Using Loftware and Cognos Reports.
Lesson 15: Cache Transfers Processing Cache to Cache Transfers.
Lesson 22: Printing Labels SKU and Storage Location.
Associate ® Administration An Associate administrator has the ability to change the parameters for both the author and for the typist. There can be enterprise.
TEXAS ENGLISH LANGUAGE PROFICIENCY ASSESSMENT SYSTEM (TELPAS) February 2013 by: Michael Marín.
© 2002, Cisco Systems, Inc. All rights reserved..
Copyright © 2010 Pearson Education, Inc. or its affiliate(s). All rights reserved.1 | Assessment & Information 1 Online Testing Administrator Training.
Copyright © 2008 Pearson Education, inc. or its affiliates. All rights reserved. Welcome to PearsonAccess Session Two Administrative Functions.
Lesson 5: Managing Catalog (NWCG/Cache System Administrators )
© 2015 Lexmark International, Inc. All rights reserved. December 8 – 16 th, x Enovia Upgrade Training.
Create and Assign Entity Roles
iShop Training Module Access & Security
Data Virtualization Demoette… CIS Rights
Module 7: Managing Access to Objects in Organizational Units
Lesson 25: Task Management
Lesson 7: Epic Appointment Scheduling Referrals - Assign Referral for Past Appointment This material contains confidential and copyrighted information.
Referrals - Assign Referral for Past Appointment
Presentation transcript:

Lesson 3: Managing User Access and Security (Cache Administrators only)

Copyright 2002 Sterling Commerce, Inc. All rights reserved. 2 Objectives After completing this unit, you should be able to: –Create a User –Query User Access and Permissions by: Querying User Groups Querying Permissions for User Groups Querying Menu Groups

Copyright 2002 Sterling Commerce, Inc. All rights reserved. 3 What is a User? - A person with authorized access to ICBS. - Users are created by the Cache System Admin - Users are assigned to Group Subscriptions depending on their responsibilities and job duties.

Copyright 2002 Sterling Commerce, Inc. All rights reserved. 4 Controlling User Access You can control users access to actions and views provided by the organization to which they belong to User permissions ensure that users access the appropriate information for carrying out their tasks User access and permissions can be defined using: –User Groups User group permissions are maintained by the NWCG Cache System Admin Changes to permissions are Enterprise wide

Copyright 2002 Sterling Commerce, Inc. All rights reserved. 5 User Group A collection of users performing a similar task

Copyright 2002 Sterling Commerce, Inc. All rights reserved. 6 Administering User Group Permissions Users can be allowed or disallowed permissions for an entire module, on a screen-by-screen or function-by- function basis.

Copyright 2002 Sterling Commerce, Inc. All rights reserved. 7 Creating Users - Users are created at the Cache - Creating and Managing User access is done through the Configurator by the Cache System Admin role. Applications > Platform Security > Users

Copyright 2002 Sterling Commerce, Inc. All rights reserved. 8 Creating a New User Click on person with the green plus to create a new user.

Copyright 2002 Sterling Commerce, Inc. All rights reserved. 9 Creating a New User cont’

Copyright 2002 Sterling Commerce, Inc. All rights reserved. 10 Assigning Users to Groups Highlight the group subscription and click on the

Copyright 2002 Sterling Commerce, Inc. All rights reserved. 11 Lesson 3: Summary In this lesson, you should have learned that: –A user is a person or an entity with authorized access to ICBS –Users are created through the Configurator –Control of users access to the actions and views is managed at the NWCG System Admin level –Menu groups User groups –A Menu Group defines the screen structure that is displayed to the user –User groups are used to define access permissions, to individual screens and actions in the UI, for all users in that group

Copyright 2002 Sterling Commerce, Inc. All rights reserved. 12 Questions?