Introduction to the Security Subsystem

 

Introduction

The purpose of the Security Subsystem is to maintain the security and integrity of the System by controlling access to it. Users may be granted controlled access to the System, Subsystems, forms or data elements with one or a combination of select, insert, update or delete functions. Access may be restricted to certain sets of data which meet predetermined selection criteria.

Explanatory diagrams and detailed information about the Subsystem are given in Understanding Security, and a comprehensive Glossary explains the terms. For help in using particular forms, access the Subsystem table of contents by clicking the TOP OF SEC navigation button above. For information on system wide features and functionality, consult the System Overview chapter of this manual. Help for a specific topic can be found using the Index.

 

Users

Access to, and use of, this Subsystem is limited to a small group of key personnel. These personnel are likely to have positions with titles such as Application Support Administrator (an IT person) and/or Systems Administrator/Manager (a Student Administration Systems person).

For purposes of this document, the Security Subsystem is split into two areas of responsibility although individual institutions may choose to arrange these responsibilities differently:

Last Modified on 12 December, 2003