Security Builder is the program you will use to identify which products and programs a group of employees can access. You can also create override security access for individual employees.
There are four areas in the Security Builder that you will use to build security records. They are User Security, GL Security Template, View Builder and Roles. These areas allow for definition of what each assigned user will see in their web portal.
When you select Security Builder from your menu system the new User Security page displays. This page exposes all User Securities in a grid view which also includes 'Employee Name', 'Employee No' and 'Status.' The top menu bar provides access to additional pages, including GL Security Templates, View Builder and Roles.
User Security
-
This is where override security information can be entered for individual employees. An override location and/or authorizer code and/or role code can be entered. If the Security Check finds an entry in this program for the employee, it will use this override security information instead of the security information collected during the Security Check. The location codes are alpha or numeric.
-
Security Builder is also able to narrow down the User Security location. Access can now be specified for a product group related to a single location or multiple locations. This requires a special format.
-
For multiple locations, it would be written as (BMW=0014|0022) where BMW stands for the product grouping and 0014 and 0022 are locations. For a single product/location it would be written as (BMW=0090).
GL Security
-
GL Security defines the General Ledger accounts that a user would be permitted to view. A GL Security template can be defined or modified here. The template can then be applied to a role and/or a User Security for each user requiring GL limitations on the web applications. GL Security Template lines can be added, edited and deleted individually.
View Builder
-
The View identifies which programs within the Environment the user can access. The View lists all possible programs available then you assign security access to the desired programs. For example, SIW (Staff Information Web) has numerous options under 'Employee Info' but you may only want to give the employee group access to the 'Individual Info' program.
Roles
-
The Role contains the different Views that the user will see. Each View will be accessible through a Menu Tab. When the user clicks on that Tab, they will see the menu options and programs that are available to them as defined in the View.
-
The Role code is found in one of these three places in the following priority order:
-
Security Builder User Security
-
HR Assignment Position Code Database
-
HR Employee Category Code Database
-
Activity
-
This is where the user may see a listing of changes made to User Security, GL Security, Role, and User Manager, including:
-
Add and Delete - with specific details about what was added or deleted and who performed the action
-
Update - with details about the specific change, for example, when updating User Security you may make a change to Location Codes, Authorizer, Role Code, and GL Security, the update record will list exactly what has been updated
-
Ability to set an Audit Retention period, the default is 365 days (1 year - to a maximum of 5 years)
-
Ability to export the contents of the grid to Excel
-