Security |
To configure a security list for the capture configuration, first, select one of the following options: ▪Public: Any user with access to SE Capture may also access the capture configuration. ▪Restricted: Only certain SE Capture users will be allowed access to the capture configuration. Thus, the buttons on the side toolbar will be enabled. Click on the button and, on the selection screen that will be opened, perform the following steps:
1.Select one of the following options to set the access type that will make up the security list:
2.According to the selected access type, the Search fields will be enabled for filling. Use them to make it easier to search for desired records.
3.If the selected access type is Organizational unit, the hierarchy of business units and the departments belonging to them (if any) will be displayed. Check the business units and/or desired departments. By checking the "Consider sublevels" option at the bottom of the screen, the system will also consider the organizational units that are down in the hierarchy of the selected organizational unit. Note that by checking this option, if new organizational subunits (whether they are business units or departments) are subsequently added, they will be automatically added to the security list. Next to the hierarchy, the system also makes available buttons that allow you to check all the sub-levels of a particular organizational unit or uncheck all sub-levels. Notice that by using the "Check all sub-levels" button, if new organizational sub-levels are added later, they will not be incorporated into the security list.
4.After that, click on the button on the toolbar of the selection screen. Depending on the access type selected and the values entered in the filters, the result will be displayed in the list of records, located at the bottom of the screen. Select the ones that will compose the security list. Hold the SHIFT or CTRL keys down or check next to each item, to select more than a record at a time.
5.In the Controls field, expand the list and check the desired actions. Then, define if they will be allowed or denied for the access type:
6.Once done, save your selection. Use the other side toolbar buttons to edit and delete the record selected in the security list. |