Home > Administration > Security > Getting Started
Anyone with the SysAdmin and SecAdmin capabilities can configure security. After installation, the EasySpooler administrator has these capabilities as part of the SeniorAdmin role.
To access the security settings and get acquainted with the Security options, click Admin on the main menu and click the Security option.
The following menu options pertain to defining access security which controls access to documents, destinations, and administrative functions by granting or denying access on the basis of the user (or the user group), the type of access requested and the destination requested. See Access Control for more information.
You can edit three types of permissions definitions for access control:
Default permissions --The default permissions pertain to users not defined as individual users in user or group permissions. When first installed, EasySpooler gives undefined users the User role and access to all destinations. See Roles and Capabilities and Default Permissions for more information.
Base permissions --You can use base permissions to define permissions that apply to all users except remote. When first installed, EasySpooler does not have any base permissions defined. See Roles and Capabilities and Base Permissions for more information.
Remote permissions --These permissions provide access control for a request coming from a user on an untrusted system. For more information on trusted and untrusted systems see Files that Identify EasySpooler Hosts for more information. Also see Roles and Capabilities and Remote Permissions.
You can add permissions for individuals and groups.
Users -- Select Users to add permission definitions for individual users. See Roles and Capabilities and User Permissions for more information.
Groups -- You may want to add groups if you have groups of users to whom you want to give the same permissions. See Roles and Capabilities and Group Permissions for more information.
You can use pre-defined roles and destination lists when you define permissions definitions.
Roles -- For convenience, EasySpooler provides these predefined roles that group the capabilities you are likely to want to give to some users.
Admin
SeniorAdmin
User
You can change the capabilities assigned to any role. You can also define additional roles and assign capabilities to them.
We recommend that, before you add users to the User Permissions list or groups to the Group Permissions list, you look at the capabilities assigned to the predefined roles. You can determine whether you want to change the assigned capabilities or add any additional roles. Then you can use the roles when you define the permissions for individual users. See Roles and Capabilities for more information.
Destination Lists -- This option allows you to create lists of EasySpooler destinations for use in assigning destination access in permissions definitions. After you define destination lists, you can use them when you change or define default, base or remote permissions or for individual users or groups. See Destination Lists for more information.
The following menu options pertain to security mapping, which allows you to define mapping definitions for users that are not included in permissions definitions. You can define a user map that maps documents to another user or group. You can also defining a mapping definition to override the document security, the document owner, group and permissions. For more information see Mapping.
Default mapping -- Configuring a default mapping definition can provide a user and/or group, and document permissions, for undefined user. See Default Mapping.
Remote mapping -- Configuring a remote mapping definition can provide a user and/or group, and document permissions, for a user on an allowed, but untrusted host. See Remote Mapping.
User mappings --You can create a user map that maps documents submitted by a particular user to another user and/or group. See User Mapping.
Group mappings --You can create a group map that maps documents submitted by a particular group to a particular user and/or group. See Group Mapping.
Check permissions -- You can determine if a user would be allowed or denied a capability for a destination. See Check User Permissions for more information.
Setting up security may include some or all of the following procedures: