Security Handling

Click on any of the topics below to see more information.

SICS Access Security Overview

1 minute read

The SICS access security facility provides the capability to allow or deny users from performing various business functions.

Use Cases

3 minute read

To access Use Case information, click the Use Cases tab in the Access Security Manager window.

Maintaining User Roles

6 minute read

User roles define the responsibilities of typical system users, such as underwriters or accountants. Each user role contains one or more use cases that defin...

Using Domain Restrictions

less than 1 minute read

Domain Restrictions (also referred to as data-sensitive security) are mainly used to control values users enter into the system. Some of the restrictions ens...

Filters

9 minute read

Filters are only used in some of the security domain restrictions. Then filters are used to filter businesses. Depending on whether the business was selected...