Security Information

There are several different levels of security in ActionWare:

  1. Basic iSeries (AS/400) security is established with the definition of the user profile. If a user is not allowed access to the library, the user will not be able to use ActionWare. Additionally, a very basic security function exists in ActionWare System Options where if a user is NOT enrolled in ActionWare they are prevented from entering the database.

  2. There are numerous System Options that may be set by the System Administrator. These System Options are a powerful set of controls that activate or limit functionality. These options also allow a level of Security both on a global, company wide basis and also on an individual override basis.

  3. Security Maintenance allows for restriction of a user's access to a given contact record with a particular OWNER (OWN field data). The restriction maybe as limited as not being able to view the contact record or just a restriction involving functions such as add, change or delete. The System Administrator may choose to mask from view all contact records from users, limiting them to only those contact records that they "OWN" by virtue of having their userID in the OWN field data in the database. The Security Maintenance may also be on a Panel level including viewing activities and activity notes.

  4. Hierarchical Security is our most complex level of security and is recommended for those companies that have very restricted systems with over 100 users. If hierarchical security is activated, a traditional managerial structure is imposed on basic security. The managerial structure is based on a maximum of five levels identified as level 4 through level 0 with level 4 being the highest.

Hierarchical security also lets you define lateral security as well. If the staff authority function found in the security definition is activated for a specific user, the user has the same ownership authority of users lower in the direct hierarchy as well as users on the same level. The assumption is made that higher authority will be granted within the hierarchy. If temporary authority is needed outside the hierarchy, then use peer-to-peer security. Staff authority is activated peer-to-peer. Hierarchical security lets the System Administrator assign system options by individual and by security level. For example, users at level 0 might not have the System Control options set to change records, while users at level 3 might have. The number of levels identified in the managerial hierarchy is user-definable. A manager is given the same authority as the users who are lower in the hierarchy. The example shown in the figure below illustrates four security level.

  1. Extended Master Control Options are similar to System Options and they provide additional functionality controlled not by a single value but by a keyword. Therefor, an EMCO is a way to add programmed functionally to the system external to ActionWare's System Options. EMCO's consist of two parts, (1) a Keyword, and (2) its associated Value, often referred to as its Data. Periodically, as ActionWare is enhanced we use EMCO's for access added functions.

  1. Activity Note Security locks down the ability to edit a note for users based on a specified date structure defined by the System Administrator