PANTHEON™ Help

 Toc
 Početna stranica
[Collapse]PANTHEON
 [Collapse]PANTHEON priručnici
  [Expand]Vodič kroz Datalab PANTHEON Farming
  [Expand]Vodič za mobilni POS
  [Expand]Vodič po DataLab PANTHEON™-u
  [Expand]Vodič po PANTHEON Vet
 [Collapse]PANTHEON korisnički priručnici
  [Expand]Korisnički priručnik za DataLab PANTHEON™
  [Expand]Korisnički priručnik za PANTHEON Vet
  [Expand]Korisnički priručnik za PANTHEON maloprodaju
[Collapse]PANTHEON Web
 [Collapse]Vodiči po PANTHEON Web
  [Expand]Vodič po PANTHEON Web Light-u
  [Expand]Vodič za PANTHEON Web Terminal
  [Expand]Arhiva starih proizvoda
  [Expand]Vodič po PANTHEON Web Legal
 [Collapse]Korisnički priručnici za PANTHEON Web
  [Expand]Početak rada s PANTHEON Web-om
  [Expand]Korisnički priručnik za PANTHEON Web Light
  [Expand]Korisnički priručnik za PANTHEON Web Terminal
  [Expand]Korisnički priručnik za PANTHEON Web Legal
  [Expand]Arhiva starih proizvoda
[Collapse]PANTHEON Granule
 [Collapse]Vodič po PANTHEON Granulama
  [Expand]Granule za Servis na terenu
  [Expand]Granula Kadrovi
  [Expand]Granula Putni nalozi
  [Expand]Granula Dokumenti i Zadaci
  [Expand]Granula Kontrolna tabla
  [Expand]Granula B2B narudžbe
  [Expand]Inventar Fiksne Imovine Granula
  [Expand]Inventar Skladišta Granula
 [Collapse]Korisnički priručnik za PANTHEON Granule
   Početak
   Korištenje PANTHEON Granula u imaginarnom poduzeću Tecta
  [Expand]PANTHEON Granule i aktivacija
  [Expand]Granula Kadrovi
  [Expand]Granula Putni nalozi
  [Expand]Granula Dokumenti i zadaci
  [Expand]Granula B2B narudžbe
  [Expand]Granula Nadzorna ploča
  [Expand]Granula Servis na terenu
   Česta pitanja i odgovori
  [Expand]Inventar dugotrajne imovine
  [Expand]Granula Inventura skladišta
   Arhiva

Load Time: 374,9964 ms
"
  6613 | 1 | |
Label


Security Policy

Security Policy

Security Policy

 

Here, security does not mean prevention of data loss due to technical failure, but preventing unauthroized access to data. Critical and confidential data is always a potential target for data abuse. But this is not the only threat. It is not that uncommon that not properly protected data is accidentally corrupted or lost, that is why a sound security policy is a must.

Talking about security policy is relevant in a networked environment and with large amounts of data, all of which should not be accessible to everyone. Security should be planned, in order to determine which users have access to which information, and which operations they can perform. Steps in making a security plan:

1. Make a list of all objects and actions that should be monitored.

2. Make a list of all users and user groups.

3. Draw relations between the two lists.

Based on the results, implement the security policy in PANTHEON.

 

046370.gif To prevent access through domain accounts, PANTHEON creates a SQL Server login for each PANTHEON user, but one that is different from the domain account. See SQL Server Logins in PANTHEON.

 

046371.gif A domain account and PANTHEON user account can be linked, so that successful domain login will allow the user to logon to PANTHEON without entering a password. See Automatic Domain User Logon.

 

046372.gif Access to data within PANTHEON ca be restricted using authorizations.

  

     


Rate this topic
Was this topic usefull?
Comments
Comment will also bo visible in forum!