User Tools


Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
en:adminmanual:securityguide:ch000 [2019/04/17 22:16]
joebordes [Table of Contents]
en:adminmanual:securityguide:ch000 [2019/04/17 23:40] (current)
joebordes [Table of Contents]
Line 1: Line 1:
 ======Table of Contents====== ======Table of Contents======
  
-  * [[en:​adminmanual:​securityguide:​ch000|Why Read This Guide?]] +  * [[en:​adminmanual:​securityguide:​ch000|This Guide]] 
-  * [[en:​adminmanual:​securityguide:​pref-manaud|This Guide'​s Audience]] +  * [[en:​adminmanual:​securityguide:​ch001|Chapter 1Introduction to Role-Based Security.]] 
-  * [[en:adminmanual:​securityguide:​pref-organization|Organization of This Manual]] +  * [[en:​adminmanual:​securityguide:​ch002|Chapter 2: Examples]] 
-  * [[en:​adminmanual:​securityguide:​pref-getbook|Getting This Manual]] +  * [[en:​adminmanual:​securityguide:​ch003|Chapter 3: Summarized Rules]] 
-  * [[en:​adminmanual:​securityguide:​pref-req-comments|Request for Comments]] +  * [[en:​adminmanual:​securityguide:​pref-acknorm|License]]
-  * [[en:​adminmanual:​securityguide:​pref-acknorm|Acknowledgements]]+
  
 This book describes the concept of role-based security and other security features as it has been implemented by coreBOS This book describes the concept of role-based security and other security features as it has been implemented by coreBOS
Line 12: Line 11:
 This book is based on the official Open Source release. Your individual configuration might be slightly different if your CRM service provider has made changes to the system. This book is based on the official Open Source release. Your individual configuration might be slightly different if your CRM service provider has made changes to the system.
  
-====This Guide'​s Audience=====+=====This Guide'​s Audience======
  
 This guide has been written mainly for coreBOS administrators. We expect that readers will have some familiarity with security management. This guide assumes a basic knowledge of security-related concepts and terms, including authentication,​ authorization,​ and roles. Although we provide a description of all features as they are implemented at the release date, this guide may not suffice as your only reference about coreBOS. This depends, on your needs and experience but also on the progress coreBOS makes. This guide has been written mainly for coreBOS administrators. We expect that readers will have some familiarity with security management. This guide assumes a basic knowledge of security-related concepts and terms, including authentication,​ authorization,​ and roles. Although we provide a description of all features as they are implemented at the release date, this guide may not suffice as your only reference about coreBOS. This depends, on your needs and experience but also on the progress coreBOS makes.
  
  
-=====Organization of This Manual=====+=====This ​Guide'​s Organization=====
  
 The first chapter of this book deals with security concept only, i.e. there are no prerequisites in terms of setting up coreBOS. It is helpful to have a basic knowledge of security-related concepts and terms. With regard to the real world example, however, having access to a CRM installation would obviously be an advantage as you could duplicate the setup and investigate your own tweaks to the security configuration.\\ The first chapter of this book deals with security concept only, i.e. there are no prerequisites in terms of setting up coreBOS. It is helpful to have a basic knowledge of security-related concepts and terms. With regard to the real world example, however, having access to a CRM installation would obviously be an advantage as you could duplicate the setup and investigate your own tweaks to the security configuration.\\
Line 25: Line 24:
 [[en:​adminmanual:​securityguide:​ch001|Chapter 1: Introduction to Role-Based Security.]] \\ [[en:​adminmanual:​securityguide:​ch001|Chapter 1: Introduction to Role-Based Security.]] \\
 Describes how role-based security works. Explains in simple terms how to prepare yourself to start working with the CRM's security features. Provides all the information required to understand role-based security supported by the CRM System. Lists all the possibilities of different security settings.\\ Describes how role-based security works. Explains in simple terms how to prepare yourself to start working with the CRM's security features. Provides all the information required to understand role-based security supported by the CRM System. Lists all the possibilities of different security settings.\\
- 
-Part II: Examples shows real-world examples for setting up complex user hierarchies\\ 
  
 [[en:​adminmanual:​securityguide:​ch002|Chapter 2: Examples]] \\ [[en:​adminmanual:​securityguide:​ch002|Chapter 2: Examples]] \\
-Explains ​on examples how to use the CRM system to assign privileges.+Explains, with exampleshow to use the CRM system to assign privileges. ​Shows real-world examples for setting up complex user hierarchies
  
-======Why Read This Guide?====== +=====Why Read This Guide?​===== 
-  * This guide is designed to be a clear and supportive reference to the vtiger CRM security concept. However, this guide is not an official documentation.+  * This guide is designed to be a clear and supportive reference to the coreBOS ​security concept
  
   * We hope to answer most of the questions you might have about the user access management at the CRM system. In particular, we cover the following subjects:   * We hope to answer most of the questions you might have about the user access management at the CRM system. In particular, we cover the following subjects:
Line 42: Line 39:
   * How to start using security settings. What should you do first?   * How to start using security settings. What should you do first?
  
-  * Customizing ​vtiger CRM. Each company is different. We explain how you can tailor the security settings to fit your company needs on real live examples.+  * Customizing ​coreBOS. Each company is different. We explain how you can tailor the security settings to fit your company needs on real-life examples.
  
   * Understanding all of the relationships. Most security settings are somehow related to other settings. These relationships are extensively documented, including the intended purpose. If suitable examples of proper usage are given.   * Understanding all of the relationships. Most security settings are somehow related to other settings. These relationships are extensively documented, including the intended purpose. If suitable examples of proper usage are given.
  
-  * Additional resourcesFinallywe direct you to other places you can go for all the latest info, and offer a complete ​set of online references.+===== This Guide'​s Acknowledgements ===== 
 + 
 +This book has been in the works for a long time. It could not have been completed without the help and encouragement of a lot of people.\\ 
 + 
 +The vtiger teamits user community, and a number of people contributed technical feedback as this book was being written.\\ 
 + 
 +We thank the countless people who contributed to this manual with informal reviews, suggestions, and fixes. While this is undoubtedly not a complete ​list, this manual would be incomplete and incorrect without the help of Emilio Paolini, Walter Schönenbröcher,​ Dirk Gorny, Alexander Rothenberg.
  
 ---- ----
 <WRAP right> <WRAP right>
-[[en:​adminmanual:​securityguide:​pref-manaud|Next]] +[[en:​adminmanual:​securityguide:​ch001|Next]] 
-This Guide'​s Audience+ | Chapter 1: Introduction to Role-Based Security.
 </​WRAP>​ </​WRAP>​
- 
- 
 ---- ----
- 
  
 © 2006 crm-now © 2006 crm-now