Security

Last modified 15:43, 20 May 2014

Overview

CCH Document Management follows the standard security model used in CCH Central; this is governed by the use of task permissions.  In addition Document Type security is used to control access to different types of document.

Any Data Security by both Client and Assignment, and Team Security that is in place for Central will be adhered to.

Task Permissions

Task permissions are used to control who can access the different areas of the system.  

Select Maintenance > Security > Task Permissions and then use the Product drop down to select Document Management. Select the Security Group that you want to set permissions for in the Group drop down.  

For more information see Setting up Task Permissions.

Data Security

Central has a Data Security model which restricts users' access to selected clients and/or assignments. This is particularly useful for private clients where only a selected group of persons within the organisation has the right to view. Document Management adheres to that security model. If a user does not have rights to view a client/assignment, none of the documents attached to that client/assignment will be visible within the Document Centre. Users will also not be able to search for the client/assignment within the Add Document window (or Properties panel).

Document Type Security

Select Maintenance > Security > Document Security to specify which libraries and types of document a user has access to.

window_Maintenance_DocumentSecurity.png

Use the drop down fields to select the library and security group that you want to set permissions for.

Where a user does not have View permission for a document they will not be able to search for documents of that type/

Where a user does not have Edit permission for a document type they will not be able to edit the document or any of the document properties.

Where a user does not have Add permission for a document type this document type will be excluded from the list of types for selection when adding documents, creating documents, or changing the document type for a document type that is already in the system.

If a user does not have access to any of the document types within a library then they will not see that library in any library selection options.

Related

Controlling Access to Data
This is where you define an additional level of security that controls which areas in the practice (Company, Office, Department, or Centre) can see assignments for clients that are sensitive. These settings apply across the whole practice.
Setting up an Employee Security Group
CCH Central comes with some security groups but you can add new security groups if required.
Editing Employee Group Security
When employees log on to CCH Central they inherit the permissions of the groups they belong to. You can modify an employee's Group Security any time. Employees have to be part of at least one security group before they can use the database.
Adding an employee to an Employee Group
This is where you add employees to security groups to define their access rights to the application. This is usually completed when using the Wizard to create an employee record but it can also be done through the Employee Details page > Security Groups tab. Every employee has to be part of at least one security group before they can use the database. When you first access the Security Groups window for an employee, you will see two lists of security groups. They are: Is Not A Member Of... list displaying all the groups set up in CCH Central. Is A Member Of... list is blank until you add the security groups from the first list.
Modifying Security Group Details
Security groups are used to group employees together who will use the same features of the database. Employees can be grouped together for various reasons but normally, it is because they are at the same staff level or they perform similar duties. You can amend a security group as long as it is not being used by the system.
Deleting a Security Group
CCH Central comes with some default security groups but you can delete any security group as required.
Symbols used in Security Settings
To add or alter task permissions use the following symbols to tell the system what you are referring to.
Setting up Task Permissions
Task permissions are set to control access by users to the system. Permissions are either set as enabled or disabled and depending on that setting and what group the employee belong to, they will or won't be able to carry out certain functions. Once you have set up security groups, the next step is to set up the task permissions that belong to each security group. This means selecting which menu options, windows, tab windows and software functions a security group can access or edit.
Security
CCH Corporation Tax follows the standard security model used in CCH Central; this is governed by the use of task permissions.
Security
CCH Corporation Tax follows the standard security model used in CCH Central; this is governed by the use of task permissions.
Setting up Task Permissions
Task permissions are set to control access by users to the system. Permissions are either set as enabled or disabled and depending on that setting and what group the employee belong to, they will or won't be able to carry out certain functions.
Page statistics
451 view(s) and 4 edit(s)
Social share
Share this page?

Tags

(not set)

Comments

You must to post a comment.

Attachments

 

 | Cookie Policy | Copyright | Privacy Policy Terms of Use | Contact Us |