Security: Difference between revisions
From IHRIS Wiki
Sturlington (talk | contribs) No edit summary |
Sturlington (talk | contribs) No edit summary |
||
Line 1: | Line 1: | ||
This documentation reinforces security procedures on iHRIS software. We are currently reviewing and updating this documentation. | This documentation reinforces security procedures on iHRIS software. We are currently reviewing and updating this documentation. | ||
* [[ | * [[User Access]] | ||
* [[Configuring Restricted Access by Facility or Geography]] | * [[Configuring Restricted Access by Facility or Geography]] | ||
* [[Tasks and Roles]] -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system. A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system. | * [[Tasks and Roles]] -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system. A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system. | ||
[[Category:iHRIS Software]][[Category:Review2013]] | [[Category:iHRIS Software]][[Category:Review2013]] |
Revision as of 15:31, 8 November 2013
This documentation reinforces security procedures on iHRIS software. We are currently reviewing and updating this documentation.
- User Access
- Configuring Restricted Access by Facility or Geography
- Tasks and Roles -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system. A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system.