My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2009-336
CBCC
>
Official Documents
>
2000's
>
2009
>
2009-336
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/18/2016 10:47:14 AM
Creation date
10/1/2015 4:04:10 AM
Metadata
Fields
Template:
Official Documents
Official Document Type
Agreement
Approved Date
12/15/2009
Control Number
2009-336
Agenda Item Number
12.J.5
Entity Name
N. Harris Computer Corporation
Advance Utility Systems
Subject
Utility Billing Systems Software
Supplemental fields
SmeadsoftID
10928
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
306
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
ADVANCED <br /> 0 t 1 L. 4 7 Y S Y b T r +Y S <br /> Security <br /> Security setup is similar to Microsoft NT security . System administrators create user <br /> identifications and users can belong to one or more groups . Objects in CIS Infinity can be <br /> restricted by user id, or by group. <br /> The first level of security in CIS Infinity is the ability to completely configure the user' s <br /> menus and items on menus . If you do not wish to give a user access to a form you can <br /> simply not place the form on the user' s menu . <br /> System Administrators can pre-define a series of menus that are common, and those menus <br /> can be placed on the users menu. Each user' s menu does not be to be defined from scratch <br /> and could simply have the pre-defined menus on them. <br /> Each item that can be added to the users menu comes with a pre-defined description from <br /> Advanced , these descriptions can be customized by the System Administrators to suit your <br /> needs and terminology . <br /> Security in CIS Infinity is object based rather then field and table based . This allows system <br /> administrators to secure not only secure fields, but objects such as buttons and pick lists . <br /> You can secure anything you see on the forms of CIS Infinity rather then just restrict users' <br /> access to fields or tables . Objects that can be restricted in CIS Infinity Include: <br /> • Fields <br /> • Forms <br /> • Pick lists (entire pick list or selected items in the pick lists) <br /> • Accounts (you can restrict access to particular customers' accounts by user id or by <br /> group) <br /> • Batch of Cash (only cashier can use their own batch) <br /> • Billing Batch <br /> • Buttons on forms (restrict users or groups from functions on forms) <br /> Restrictions on objects include read only, visible to user, deletion, addition and more. <br /> Security options differ based on the type of object. For example, entire forms can be made <br /> read- only or you can restrict the user to editing current information but they cannot add or <br /> delete . <br /> Indian River County, FL 29 <br />
The URL can be used to link to this page
Your browser does not support the video tag.