Security: Difference between revisions
From IHRIS Wiki
Sturlington (talk | contribs) No edit summary |
Sturlington (talk | contribs) No edit summary |
||
Line 3: | Line 3: | ||
* [[Pluggable Authentication|Pluggable Authentication Modules]] | * [[Pluggable Authentication|Pluggable Authentication Modules]] | ||
* [[Configuring Restricted Access by Facility or Geography]] | * [[Configuring Restricted Access by Facility or Geography]] | ||
* [[Data entry statistics]] | * [[Data entry statistics]] | ||
* [[Tasks and Roles]] | * [[Tasks and Roles]] | ||
[[Category:Implementer Resources]][[Category:Procedure]][[Category:Security]][[Category:Review2013]] | [[Category:Implementer Resources]][[Category:Procedure]][[Category:Security]][[Category:Review2013]] |
Revision as of 16:10, 16 July 2013
This documentation reinforces security procedures on iHRIS software. We are currently reviewing and updating this documentation.