Security: Difference between revisions

From IHRIS Wiki
No edit summary
No edit summary
Line 5: Line 5:
* [[Tasks and Roles]] -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system.  A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system.  
* [[Tasks and Roles]] -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system.  A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system.  


[[Category:Implementer Resources]][[Category:Procedure]][[Category:Security]][[Category:Review2013]]
[[Category:iHRIS Software]][[Category:Review2013]]

Revision as of 15:14, 8 November 2013

This documentation reinforces security procedures on iHRIS software. We are currently reviewing and updating this documentation.

  • Pluggable Authentication Modules -- This article collects together the various authentication modules that utilize the pluggable authentication available with version 4.0.3 of the iHRIS Suite.
  • Configuring Restricted Access by Facility or Geography
  • Tasks and Roles -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system. A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system.