Security: Difference between revisions
From IHRIS Wiki
Sturlington (talk | contribs) No edit summary |
Sturlington (talk | contribs) No edit summary |
||
Line 5: | Line 5: | ||
* [[Tasks and Roles]] -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system. A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system. | * [[Tasks and Roles]] -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system. A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system. | ||
[[Category: | [[Category:iHRIS Software]][[Category:Review2013]] |
Revision as of 15:14, 8 November 2013
This documentation reinforces security procedures on iHRIS software. We are currently reviewing and updating this documentation.
- Pluggable Authentication Modules -- This article collects together the various authentication modules that utilize the pluggable authentication available with version 4.0.3 of the iHRIS Suite.
- Configuring Restricted Access by Facility or Geography
- Tasks and Roles -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system. A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system.