Fortix PlatformFortix Freedom Business Systems SecuritySecurity and Access Management in Fortix

Security and Access Management in Fortix

In Fortix any user that wants to use the system must be identified. Fortix uses a local database for the users’ accounts and credentials. Security administration in Fortix provides users (or groups of users) permission to access and perform tasks in different pages containing reports and other information components. For example, permission to create or change contact details. This article summarises the areas in Fortix that controls security.

User Login and password settings

Access is provided to the Fortix system with a login screen where the user is requested to provide a password. Refer to the article How to Add a New User for step by step instruction on how to set up the Login details.

Other security-related articles related to Login are: How to view a user's Login Log

Roles

Role-based access in Fortix is a crucial feature to facilitate ease of use and security. Setting up input forms and reporting based on role simplify the page and displays only the information that is important to the position.

The following articles explain how to setup and use roles:

  1. How to Create Roles
  2. How to Add a New Configuration For Contact Page (Screen layout can be changed to cater for specific roles.)
  3. Creating Organisational Structure All departments, divisions and sections are role specific
  4. Menu Mangement
  5. Managing Authorisation in Fortix

Auth Manager and Permissions

 Auth Manager dictates which Roles have what permissions. Refer to the article Managing Authorisation and Permissions in Fortix.

 

Profile Based access

Fortix enables both aggregation and segregation of data based on Profiles, useful for organisations that have various branches that share certain parts of local information.

An example of this is a head organisation that owns several smaller businesses or establishments. Each business must be treated separately. However, the head organisation should have the capability to view all data. Refer to the following article: How to create a Profile

 

Google Login

Fortix allows users to authenticate using their Google Accounts. In Fortix any user that wants to use the system must be identified. Fortix uses a local database for the users’ accounts and credentials. Refer to the article Create Google Logon Details

 

0 Comments

Add your comment

E-Mail me when someone replies to this comment