System Administration > Security
In addition to configuring core data items that are specific to your organization, you must configure settings that determine a variety of operational factors for your EMS installation, including user security settings. These settings determine the functions to which your users have access in your EMS installation.
You can access the security settings under System Administration > Security. You can then control security through user templates.
The following topics provide information about the security configuration features:
Plan Your Security Configuration
You can fine-tune security by configuring actions users should be allowed to take, information they can see, and rooms and buildings they can book. We recommend you configure security for EMS in the following phases:
-
Configure User Templates and associate them with User Processes
-
Configure Users using User Templates
A user template defines the categories, processes, buildings, rooms, statuses, and queries to which a group of EMS users has access. Instead of defining users individually and then configuring security for each user, you can configure a template and then assign all the users who are to have the same security settings to a given template in a single step. You can configure a user template entirely from “scratch,” or you can copy an existing user template, and then make the necessary edits to configure another template.