Set up configurations in WorkZone Configuration Management
Configuration of security codes
In WorkZone Configuration Management in the Registry Security module you must pre-configure the security system and assign permissions to each level of security.
The WorkZone Security System is based on 9 security codes: 1
, 2
, 3
, 4
, 5
, 6
, 7
, 8
, and 9
. For each of these security codes, you must configure a set of permissions for every register and table of the system.
The security code must reflect the permissions for a user regarding the database content.
The permissions define whether the user is allowed to search, update, insert, delete, lock, and unlock a certain type of database item, that is, a case or a relation.
The permissions of each security code can be configured to reflect the demands of specific groups of users. When a user logs on, the security code assigned to the user defines what the user is allowed to do.
Assigning security codes to users is done in Active Directory Users and Computers (AD). After creating a WorkZone user in Active Directory, the user must be added a distribution group, representing one of the 9 security codes.
When the users are replicated to the WorkZone Content Server database, each user is automatically allocated the correct security code and the corresponding permissions for registers and tables in the database.
Each security code can be customized to reflect the organization’s specific requirements and processes, but many employ the security codes as they are defined out-of-the box.
The three most commonly used security codes are:
Security Code | Description |
---|---|
1 |
This security level contains only Read access to tables and sub-tables. Users assigned this security level may only read entries from the WorkZone database and cannot create, update or delete records. The security level can be assigned to users that only require information and not editing rights. |
6 |
This security level contains some Create, Read, Update and Delete rights at a level corresponding to the expected access requirements of a user working as a typical case-worker. The security level is typically assigned to users performing normal operations in WorkZone such as case-work, document handling and contact management. |
9 |
This security level contains Create, Read, Update and Delete rights to all tables and sub-tables in WorkZone. The security level is usually assigned to System Administrators who should be able to perform all kinds of actions on the WorkZone databases. |
Configuration of contact types
In WorkZone Configuration Management in the Basic data > Addressee module, you need to pre-configure the following three mandatory contact types:
- Contact type
A
, which is used to contain the replicated Organizational units created in Active Directory. - Contact type
M
, which is used to contain the replicated user as created in Active Directory for the purpose of a Case Handler register. - Contact type
U
, which is used to contain the replicated committees as created in Active Directory.
You must create all the contact types listed above with Auto ID set to N
while the maximal length of Name Code Length must be 30 characters.
Configuration of custom labels
In WorkZone Configuration Management in the Basic data > Custom label module, you must pre-configure a mandatory contact role for members of a committee.
- Create a contact reference named Member under the NP label type.
Later on in the process you must add this role/contact reference to committees in the Active Directory Connector.
Configuration of code visibility
In WorkZone Configuration Management in the Operation > Owner module, you can change the default configuration of access code visibility. By default, both user access codes (that is, employee user codes) and unit access codes (that is, organizational unit access codes) are visible.
To deny the use of either one, select the Hide check box near each type in the Access code visibility section.
After this, the users will be able to choose only from group access codes.