Security: Difference between revisions
From IHRIS Wiki
Sturlington (talk | contribs) No edit summary |
Sturlington (talk | contribs) No edit summary |
||
Line 1: | Line 1: | ||
This documentation reinforces security procedures on iHRIS software. We are currently reviewing and updating this documentation. | This documentation reinforces security procedures on iHRIS software. We are currently reviewing and updating this documentation. | ||
* [[Pluggable Authentication|Pluggable Authentication Modules]] | * [[Pluggable Authentication|Pluggable Authentication Modules]] -- This article collects together the various authentication modules that utilize the pluggable authentication available with version 4.0.3 of the iHRIS Suite. | ||
* [[Configuring Restricted Access by Facility or Geography]] | * [[Configuring Restricted Access by Facility or Geography]] | ||
* [[Data entry statistics]] | * [[Data entry statistics]] |
Revision as of 12:42, 7 October 2013
This documentation reinforces security procedures on iHRIS software. We are currently reviewing and updating this documentation.
- Pluggable Authentication Modules -- This article collects together the various authentication modules that utilize the pluggable authentication available with version 4.0.3 of the iHRIS Suite.
- Configuring Restricted Access by Facility or Geography
- Data entry statistics
- Tasks and Roles