The Museum System

Naming Convention for Security Groups

Setting up appropriate security groups for your TMS instance is an important, and often overlooked, function of the system administrator. I have heard of many institutions that operate TMS using only the default groups, meaning that every user has system administrator privileges. Setting up security groups is more tedium than anything else; but requires two pre-requisites: conceptualizing your security groups and settling on a naming convention.

Years ago, I set out to create a naming convention that could codify the encapsulated permissions. It was based upon the Unix system of file permissions: the permissions are expressed as a single digit, and there is a digit for each top level hierarchy node. In this system, a security group might be expressed as “7467647440”. It has two shortcomings: 1) it cannot differentiate between two security groups that have permissions to edit different sets of fields in the same module, and 2) the names become quite illegible in a drop down list.

My current schema is much simpler to use and understand.

Basic Security Groups

It starts with three basic security groups that you should be familiar with:

System AdministratorThe default security group that comes with TMS.
View OnlyThe default security group, modified to exclude any sensitive data. These accounts do have the rights to create and modify packages and their contents.
No RightsThis is not a default security group, but it is easy enough to create. Assigning this group denotes that that admin has determined the user should not have access to a given department, whereas “(not assigned)” leaves ambiguity.

Power Series

The Power series of security groups provides users with broad access. Users have access to all fields (except those not currently in use at the institution), but do not have access to system administration functions, and cannot define new thesaurus xref types or text types. Users are also restricted from deleted top level records (ie, an object, constituent, or loan). While these groups are virtually identical, the split allows for differentiated access to packages, reports, and flex fields.

Power – ConservationUsed by conservators.
Power – CuratorialUsed by curators.
Power – RegistrationUsed by registrars.

Super Series

The Super series of security groups supplies superusers with broader rights than the Power series. This encompasses the ability to manage authorities and delete top level records.

Super – ConservationUsed by superusers in conservation.
Super – CuratorialUsed by superusers in curatorial.
Super – RegistrationUsed by superusers in registration.

Role Series

The Role series of security groups focuses on a particular role that a user will fulfill while accessing TMS. Each group here is unique, and only provides access to the fields as needed.

Role – Curatorial InternMost interns have permission to edit a standard number of fields.
Role – Data ScrubbingUsed by volunteers working with the system administrator to provide data scrubbing. The permissions change weekly depending upon the needs of the projects being worked on.
Role – Director’s AssistantThis security group is based upon “View Only”, but has been modified to allow the Administrative Assistant to the Director to modify certain flex fields as the Director’s proxy.
Role – Media ManagerThis security group is based upon “View Only”, but permits IR staff to maintain media xrefs and object rights.

Function Series

Finally the Function series provides discrete access to perform a specific task. Whereas the Role series tend to be tied to a particular job title and duties, the Function series is reusable across a number of job titles.

Function – Create MediaExclusively used for media departments, and allows users to create and modify media records.
Function – UnarchiveWhen certain departments are designated as “Archived” the majority of users have “View Only” permissions. This security group is based upon “View Only”, but permits the user to change the department.

Conclusion

The prefixes of the series provide instantaneous information about the scope of the permissions included. For instance, I can deduce that “Power – Marketing” has far greater access than “Role – Marketing”, and that “Super – Marketing” has far greater access than either of the former groups. The level of access is readily conveyed, unlike a group simply named “Marketing”.

While this may not be a system that can be universally applied to every institution, I think it provides a decent framework that is easily modified to meet the needs of most institutions. What do you think? How does this compare to your naming convention for security groups?

Thanks for taking the time to read my post – I hope you found it helpful.
Leave feedback in the comments below.

If this post save you time, then consider sharing it with your friends and colleagues. If it saved you some money, then please consider buying me a coffee. If you want to know when I publish new content, then subscribe to my feed. Your support encourages me to write more. Thanks!

Naming Convention for Security Groups

One Comment

Leave a Comment