Security: Difference between revisions
From IHRIS Wiki
Sturlington (talk | contribs) No edit summary |
Sturlington (talk | contribs) No edit summary |
||
Line 3: | Line 3: | ||
* [[Pluggable Authentication|Pluggable Authentication Modules]] -- This article collects together the various authentication modules that utilize the pluggable authentication available with version 4.0.3 of the iHRIS Suite. | * [[Pluggable Authentication|Pluggable Authentication Modules]] -- This article collects together the various authentication modules that utilize the pluggable authentication available with version 4.0.3 of the iHRIS Suite. | ||
* [[Configuring Restricted Access by Facility or Geography]] | * [[Configuring Restricted Access by Facility or Geography]] | ||
* [[Tasks and Roles]] -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system. A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system. | * [[Tasks and Roles]] -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system. A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system. | ||
[[Category:Implementer Resources]][[Category:Procedure]][[Category:Security]][[Category:Review2013]] | [[Category:Implementer Resources]][[Category:Procedure]][[Category:Security]][[Category:Review2013]] |
Revision as of 12:12, 28 October 2013
This documentation reinforces security procedures on iHRIS software. We are currently reviewing and updating this documentation.
- Pluggable Authentication Modules -- This article collects together the various authentication modules that utilize the pluggable authentication available with version 4.0.3 of the iHRIS Suite.
- Configuring Restricted Access by Facility or Geography
- Tasks and Roles -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system. A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system.