Navigation:  Security >

Configuring a security rules set

Previous  Top  Next

The security rule lets you set permissions on documents, eliminating the need to replicate multiple similar category structures or setting permissions manually on each document. SE Document allows configuring sets of security rules that can be applied to document categories.

 

To configure a security rule set, perform the following steps:

 

1.Access the Configuration Document Security rule menu.

 

2.Select the button on the main screen toolbar. To edit the data of a rules set, select it in the list of records on the main screen and click on the button.

 

3.On the screen that the system will open, enter an ID # and a name for the security rules set.

 

 

4.Save the record to enable the following sections:

Rules

The rules that compose the set will be displayed. The rules displayed in this section complement each other, but they are not necessarily dependent on each other. To add a new security rule to the set, click on the New rule button on the lower part of this section. See more details in the Configuring a security rule section.

 

When hovering the mouse over a rule displayed in the listing of this section, the following buttons will be available:

Click this button to edit the rule. See more details in the Configuring a security rule section.

Click this button to delete the rule.

Click this button to copy the rule. When clicking on this button, a new rule created from the copy will appear in the list of rules.

 

Type security

In this section, the configuration of the rule security list is performed. To do that, first, select one of the following options:

Public: Any user of SE Document is allowed to access the security rule.

Restricted: Only certain users of SE Document are allowed to access the security rule. By selecting this option, the system already adds the logged user with all permissions to the security list. In addition, the buttons on the side toolbar will be enabled. To perform new access to the security list, click on the button and, on the selection screen that will be opened, perform the following steps:

 

 

a.Select one of the following options to set the access type that will make up the security list:

Team: It will be composed of the members of a team already registered in SE Document.

Organizational unit: It will consist of users of a particular organizational business unit/department of the organization.

Department/Position: It will be composed of users from a specific department of the company, who hold a specific position.

Position: It will be composed of users who hold a specific position in the company.

User: It will be composed of a specific user.

All: It will be composed of all users who have access to SE Document.

b.According to the selected access type, the Search filters will be enabled to be filled out. Use them to make it easier to search for desired records.

c.If the selected access type is Organizational unit, the hierarchy of business units and the departments belonging to them (if any) will be displayed.

Check the business units and/or desired departments. By checking the "Consider sublevels" option at the bottom of the screen, the system will also consider the organizational units that are down in the hierarchy of the selected organizational unit. Note that by checking this option, if new organizational subunits (whether they are business units or departments) are subsequently added, they will be automatically added to the security list.

Next to the hierarchy, the system also makes available buttons that allow you to check all the sub-levels of a particular organizational unit or uncheck all sub-levels. Note that by using the "Check all sub-levels" button if new organizational sub-levels are subsequently added, they will not be included in the security list.

d.Then, click on the button on the toolbar of the selection screen. Depending on the access type selected and the values entered in the filters, the result will be displayed in the list of records, located at the bottom of the screen. Select the ones that will compose the security list. Hold the SHIFT or CTRL keys down or check next to each item, to select more than a record at a time.

e.In the Controls field, expand the list and check the desired actions. Then, define if they will be allowed or denied for the access type:

Control

Allowed

Denied

Edit

The user will be able to edit the security rule data.

The user will not be able to edit the security rule data.

Delete

The user will be able to delete the security rule.

The user will not be able to delete the security rule.

Security data

The user will be able to edit the configurations performed in the "Security" section of the security rule.

The user may edit the other data of the security rule, but the "Security" section will remain blocked.

List

The security rule will be displayed to the user in the lists of records that display security rules.

The security rule will not be displayed to the users when they access the lists of records that display security rules.

View

The user may view the security rule data screen in "read-only" mode.

The user will not be able to view the security rule data.

The controls that are not checked for a certain access type will be considered "denied".

Denied controls have precedence in the security list. For example: If Team A has permission to edit, and User B who belongs to this team has the edit control denied, User B cannot edit the record, even if they are part of a team with permission.

Use the other buttons next to the field to select all available controls and clear the checked options.

f.Once done, save your selection. Use the other side toolbar buttons to edit and delete the record selected in the security list.

 

5.After performing the necessary configurations, save the record.