Show 

Home > Administration > Security > Getting Started

Security: Getting Started

Anyone with the SysAdmin and SecAdmin capabilities can configure security. After installation, the EasySpooler administrator has these capabilities as part of the SeniorAdmin role.

 

To access the security settings and get acquainted with the Security options, click Admin on the main menu and click the Security option.

The following menu options pertain to defining access security which controls access to documents, destinations, and administrative functions by granting or denying access on the basis of the user (or the user group), the type of access requested and the destination requested. See Access Control for more information.

You can edit three types of permissions definitions for access control:

 

You can add permissions for individuals and groups.

You can use pre-defined roles and destination lists when you define permissions definitions.

You can change the capabilities assigned to any role. You can also define additional roles and assign capabilities to them.

We recommend that, before you add users to the User Permissions list or groups to the Group Permissions list, you look at the capabilities assigned to the predefined roles. You can determine whether you want to change the assigned capabilities or add any additional roles. Then you can use the roles when you define the permissions for individual users. See Roles and Capabilities for more information.

The following menu options pertain to security mapping, which allows you to define mapping definitions for users that are not included in permissions definitions. You can define a user map that maps documents to another user or group. You can also defining a mapping definition to override the document security, the document owner, group and permissions. For more information see Mapping.

Check permissions -- You can determine if a user would be allowed or denied a capability for a destination. See Check User Permissions for more information.

 

Configuring Security

Setting up security may include some or all of the following procedures: