Maintaining User Accounts

A user account is set up for all users registered on the system. This account includes the user's business phone number, email address, and fax number. Contact information can be automatically retrieved by the system when issuing correspondence to or from the user. For example, notifications from the organization to the user can be sent to the user's email address.

All user accounts include information regarding the user's security access rights. This includes the user's log in information (password and username), access periods (when the user can log into the system), and whether or not the user account is enabled. The administrator can search for closed and deleted users in the application. Closed users can also be searched for as part of the regular user search.

A user's security role is also stored in the user account. This security role defines the business operations and fields that the user can perform and/or access on the system. Security roles may be set up in line with or relevant to positions within an organization to define the list of access rights a user requires in order to fulfill a particular role. However, assigning security at the user level rather than position or role level means that security can be tailored per individual. Security rights can be enhanced or restricted for individual users, if necessary.

Additional security set up on a user account includes the user's location based security rights and the user's sensitivity access level. An organization location is assigned to all users. This location defines the resources available to the user, such as a printer. An organization location is assigned to all users. This location defines the resources available to the user, such as a printer.

An organization may want to limit user access to data in the main application e.g. case and client information, based on the location of the user and the location of the data. Information on location based security can be found in the Cúram Location Administration Guide. Security rights can be enhanced or restricted for individual users, if necessary, based on the user's security role and sensitivity level. For a complete overview of user security, see the Cúram Administration Guide.