IS security concepts

Every IS folder, document, and annotation has its own read access, write access, and append/execute access rights. For any item, each access right is assigned to one and only one user or group. Because you can assign only one group to an access right, the system administrator must carefully construct a group hierarchy.

For example, an item's security properties might look like this:

Read:

Accounting

Write:

Auditors

Append/execute:

Auditors

These security settings mean that members of the Accounting group can view the item. (Auditors are included in the Accounting group.) However, only Auditors can modify or delete the item. To add more users who can view the item, you would change the read access to the name of a group containing both the Accounting group and the additional users.

Default access rights

Every item acquires default access rights when it is created. You can modify the properties, including the access rights, of an object you create.

Note

Every IS user belongs to a primary group, which is usually a group of users who perform the same job (such as Auditors).

Special users and groups

An IS library defines the following special users and groups:


See also

CS security concepts

View or modify CS access rights