How does it work? Username Password Application Database Security Database Visual Guard User permissions PB Application PB objects modified dynamically.

Slides:



Advertisements
Similar presentations
©2012 Microsoft Corporation. All rights reserved. Content based on SharePoint 15 Technical Preview and published July 2012.
Advertisements

Eric J. Oszakiewski MCTS: SharePoint Application Development SharePoint Configuration.
Managing User, Computer and Group Accounts
Profile Support Team Setting Up Your User Account on Profile e-portfolio Click to progress through this tutorial.
Microsoft Dynamics® SL
Florida CRD Updates April 1, 2011 Telamon Corporation.
Tutorial EBSCOadmin User Groups support.ebsco.com.
MSIS PRIMARY/SECONDARY TRAINING OFFICE OF MANAGEMENT INFORMATION SYSTEMS MISSISSIPPI DEPARTMENT OF EDUCATION MDE/MIS DATA CONFERENCE.
SESSION TWO SECURITY AND GROUP PERMISSIONS Security and Group Permissions.
RequisitePro (1) Copyright, 2001 © Jerzy R. Nawrocki Quality Management Lecture.
Dashboard Company Settings Controlled Online Accounting.
Chapter 5: Configuring Users and Groups. Types of User Accounts Administrator –Unrestricted access to performing administrative tasks –Use sparingly Standard.
Welcome to the Acceptance Test Presentation Mr. Jay Bebb & Mr. Brian Peppiatt.
Compe 341 Oracle Installation Procedure. Oracle From Click.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
Chapter 8 Chapter 8: Managing the Server Through Accounts and Groups.
Train The Trainer Employee Central Administration
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Sql Server Advanced Features MIS 424 Professor Sandvig.
Working with Workgroups and Domains
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
2013.  Modify QuickBooks Preferences  Customize QuickBooks Menus and Windows  Customize the Icon Bar and Display Settings  Use the Item List and Other.
Field Level Security. Experience Kurt Quiggle: GP Solution Architect/Project Manager Microsoft Certified Trainer Worked with the Microsoft Dynamics.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
Using SAS® Information Map Studio
EHR Deployment Network Share Setup Updater Service Deployment
Product Tracking Database Sponsored by Aviation learning, Inc. The goal is to create an n-tier, client-server system that will track the product and order.
E-Michigan Web Development 1. 2 What Is It? A web based collaboration tool that is internal to state government and accessible only from within the state.
VSTOP Database Dr. Jay Bagga VSTOP co-Director Professor of Computer Science Ball State University.
Security Windows 2000 Richard Goldman © December 4, 2001.
Page 1 User Accounts Lecture 3 Hassan Shuja 09/21/2004.
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
SPAM Student Payroll And Management. SPAM Overview " Project Plans " Student functions " Administrator functions " Detailed Design " Technical Specifications.
1 Delta Confidential 1 Extranet FTP Portal DET - IT Department March 30, 2006.
Staff Module and Summary of Changes 1. Icon Changes: Page 3 Signing In and Password/Pin Changes: Page 4 Logging Out: Page 8 Staff Module Changes: Page.
Information Management System “Institutions Module" Information Management System “Institutions Module" The System management module is an integrated part.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
Staff Module and Summary of Changes 1. Icon Changes: Page 3 Signing In and Password/Pin Changes: Page 4 Logging Out: Page 8 Staff Module Changes: Page.
1 Selected Topics in Management Information Systems [MOIS470] Fall 2004 Nahed Amin MS Access (Control Extensions)
To begin: sign into Google Docs by signing in with your Google Account username and password.
Stanislaus County Employee Access DataStore Application Presented By: Melanie Lema, Information Technology Unit Stanislaus County Department of Child.
The Exchange Network Node Mentoring Workshop User Management on the Exchange Network Joe Carioti February 28, 2005.
CERN IT Department CH-1211 Genève 23 Switzerland t Single Sign On, Identity and Access management at CERN Alex Lossent Emmanuel Ormancey,
BI Reporting Tools Kalyn Kelly June 10, BI – Business Intelligence  A set of theories, methodologies, architectures, and technologies that transform.
AA207: Designing a Security Policy in Laserfiche 8 Connie Anderson, Technical Writer.
Chapter 9 Lecture 4. NetWare Novell’s network operating system Biggest competitor – Microsoft Windows.
ID8 TEAM 2012 Caroline Amaba Ryan Gavin Mike Hegadorn Greg McLeod John Scire Nirmal Rajan.
Gmail Technical Support Toll free Number – For more information visit this link -
Module 8: Implementing Group Policy. Overview Multimedia: Introduction to Group Policy Implementing Group Policy Objects Implementing GPOs on a Domain.
Creel & Market Surveys Database Training Workshop - October/November 2014 Funded by European Union SciCOFish Scientific support for the management of Coastal.
Securely Managing VMS from a Windows Environment 1.
Implementing a Security Policy in Laserfiche 8 LAB 201 Steve Hackney.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Windows XP Professional Not Finish Yet
Informer 5 Teams and Security Collaborate on, Secure, and Share Content PRESENTER: Tim Nicholson| Director, Informer Customer Services| April 21, 2017.
Chapter 6 – Users, Groups, and Permissions
Customer & Inventory Management System: CIMS
6/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Presented by [Harshit Agrawal] 03/02/2017
GMS.NET Security Overview.
مراجعه النظم Information Systems Audit
ISAM System Architecture Buthayna Elabdalla & Bao Vuong Spring 2007
Dynamics GP 2018 – Payroll and Human Resources
Create New User in Database. First Connect the System.
Navigating GP Security
February 11-13, 2019 Raleigh, NC.
Module 8: Implementing Group Policy
ക്ഷീര ജാലകം ഹെല്പ് അഡ്മിന്‍ ജീവനക്കാരന്‍ കീഴുദ്യോഗസ്ഥര്‍ക്കു ലോഗിന്‍ പ്രോവിഷന്‍ നല്‍കുന്ന വിധം
Intermediate Documents Session 2
Presentation transcript:

How does it work? Username Password Application Database Security Database Visual Guard User permissions PB Application PB objects modified dynamically

Security Database Who will define the security information? Step 1 : the development team lists all possible permissions. (What can be authorized or not in each window of the application?) Step 2 : an administrator (end-user) lists all users of the application and grant them with permissions. DEVELOPERADMINISTRATOR Important : This does not require any technical skill. It can be done at any time after deployment.

Security Management DEVELOPER Application ADMINISTRATOR Application Used by developers before application deployment End-user application (no technical skill) Used after application deployment Profiles Customer managment, Product Management,… Ex : Customer Relationship Application Right to edit customers Right to view all orders,… Hide fields, disable menus, filter DW,… Sales Manager profile Secretary profile, etc… Mr Smith, Mrs Wesson, etc… Accounting department, Sales people, etc. Application Subdivision Permissions Technical Action User Groups Users Application