Configuration

This section covers all of the reference pages involved in security configuration. The establishment of security is not necessarily done in the order of page below. On example is that some pages listed in the middle contain user information, which is listed near the end.

Below is an illustration of the basic security model components and their relationships. The numbers in the graphic correspond to the typical order in which the components are defined. It is important to understand the relationships between these components throughout this guide. Security administrators new to CGI Advantage are recommended to print out the page showing this model for quick reference.

Shows 7 Security Model Components: 1) SCRGRP - Resource Groups - A collection of application resources that have similar authorization requirements that are secured in the same way. 2) Application Resources - Individual items within the system to which security rules can be applied. 3) SCROLE - Security Roles - Collections of user roles with same functional tasks and security requirements, including System Administrators, Procurement Officers, and Accounts Payable Manager. 4) SCRACS - Access Control - flows between Resource Groups and Security Roles. 5) SCUSCH and SCUSER - User Administration - provides a unique ID for each user and maps to Security Role(s). SCROLU is routed to Security Roles. 6) SFGORG - Foreign Organizations - Associates Security Roles and User IDs to organizations other than the home organization. 7) Document, containing two Fields, Table containing one Field, and Row containing two Fields.