- 19 Mar 2024
- 1 Minute to read
- PDF
Administration
- Updated on 19 Mar 2024
- 1 Minute to read
- PDF
Administration focuses on establishing the core elements for secure user access and system administration. Here’s an overview of the key areas:
Sign-on: Define how users log in to the system. This includes selecting an authentication system (username/password or single sign-on), setting password complexity requirements, and implementing self-service password resets.
User Access and Roles: Create user accounts and assign them the necessary roles. Roles define a user's level of access to specific features, data, or functionalities within the system.
User Profiles: Create user profiles to collect useful information about each user, such as their name, contact information, department, and possibly even custom attributes tailored to your organization's needs.
Authentication Methods: Determine how users will verify their identity during sign-on. Common options include passwords, and multi-factor authentication (MFA) which adds an extra verification step (like a code from a phone app).
Licensing: Manage the system's software licenses. This could include assigning licenses to specific users or groups based on their needs, ensuring compliance with licensing agreements, and even activating any paid features.