When preparing for training sessions, it is a good idea to elevate your users’ permissions so that they can fully participate in training. However, this can expose users to highly sensitive information – such as valuations – that they would not otherwise have access to. This makes it necessary to hide the money.
Month: May 2017
Auditing User Security Profiles
Once you have conceptualized and named your security groups and created them in the Database Configuration tool, it’s time to apply them to your userbase, and apply them consistently. Here is a Crystal Report that you can use to see users organized by security group and department. It’s a useful tool for being able to …
Naming Convention for Security Groups
Setting up appropriate security groups for your TMS instance is an important, and often overlooked, function of the system administrator. I have heard of many institutions that operate TMS using only the default groups, meaning that every user has system administrator privileges. Setting up security groups is more tedium than anything else; but requires two …