Security

Security Initial Setup

In its simplest form, security in this system is based on the access of a role to a screen and through the screen to the data. Individual users are applied to these roles and thus receive access through the role.

Entry defaults as well as company accesses are defined through the user.

Initially, you will need to set up a MASTER role and user who will be used to set up all other users. It is required that you use DA as the MASTER user within the CMiC system.

Once you have set up the Master Security, you can then set up all other roles and users within your system.

Master Security Setup

1. Define a “Master Access” role in Define Roles screen.

NOTE: Do not set privileges using [System Privileges] button and [Configuration Privileges] button.

2. Assign role “Master Access” to user DA.

NOTE: Do not do Step 4 before you complete Step 3 - you will lock yourself out!

3. Set privileges for the “Master Access” role and select [Yes] option to update users.

4. Define roles for applications.

5. Assign user preferences to DA.

User Setup

1. Define required roles and related privileges in the Define Roles screen.

2. Apply roles for applications/programs.

3. Create job/project security groups.

4. Create compliance security groups (if required).

5. Create department security groups (if required).

6. Create Payroll security groups.

7. Create user.

Limited Security/Assign Role Privilege Option

This option provides users with a privilege role that enables users to modify other users and roles not associated to their user account if they do not have the privilege.

Implementation

Prior to checking ‘Enable Limited Security’ checkbox in the System Options screen (standard Treeview path: System > Setup > System Options – General tab), ensure that at least one administrator account has the ASSIGNROLE privilege assigned. This user can then be used to complete setup of the other administrators as required.

Enable Limited Security

On the System Options screen, check the ‘Enable Limited Security’ checkbox. This activates the use of the privilege when administrating roles and users.