Security
From IHRIS Wiki
This documentation reinforces security procedures on iHRIS software. We are currently reviewing and updating this documentation.
This article collects together the various User authentication modules that utilize the pluggable authentication available with version 4.0.3 of the iHRIS Suite.
- Configuring Restricted Access by Facility or Geography
- Tasks and Roles -- iHRIS uses a task- and role-based security mechanism to limit access to various parts of the system. A user is assigned a role, and a role is a collection of tasks that the role can perform. This article describes how roles and tasks are defined in Magic Data and used by the iHRIS system.