VSys One: Volunteer Management Software

Previous Topic

Next Topic

Book Contents

Book Index

User Security Concepts - Compatibility Mode

Inheritance

In addition to their own assigned rights, users can also inherit rights from other people. If you have many people who should have the same or similar access rights, it's a common practice to define one user who has the basic rights, then allow other users to inherit rights from that "template" user. Make and name a security user with the appropriate privileges, and use him as a template to create user roles.

External security

Security restrictions in VSys only tell VSys not to perform certain operations. Information in your database is not necessarily encrypted or protected from other applications. If your data is stored in SQL Server, for example, users with access to SQL Server Enterprise Manager can access the tables directly, completely bypassing VSys Security.

Security indicators

When you're logged into VSys with security, at the top of the screen you'll see a note saying "You are logged in as xxx". If you're a superuser, you'll see a secret agent icon up there as well: Linked Graphic For other users, if there is a portrait picture in their personal profile, that image will appear instead.

If you're logged in as a superuser, you probably should not walk away from your machine while another user may get physical access to your machine. He cannot elevate his own access rights by using your machine to access the Security manager, because VSys will require you to re-authenticate before launching any of the security-related tools. But he would still have access to many functions and his actions would be logged under your name.

See Also

User Security Rights - Compatibility Mode

User Security Rights Inheritance - Compatibility Mode

General Rights

People Rights

Application Forms Rights

Certification Rights

Project Rights