When configuring who can access Security Center, you should first define the security partitions (responsibility boundaries), and then select the user groups and individual users who can access these partitions.
What you should know
When securing access to your software, you should ask
the three following questions:
- Who needs to use the system? – Which users and user groups can log on?
- What do they use it for? – What privileges must they have?
- Which parts of the system are they responsible for? – Which partitions must they have access to?
Best Practice: It is easier to define security partitions when you first set up
your system. That way, as you create entities in your system, you can place them
directly into the partitions where they belong. If you start by creating users first,
you might end up having to revisit their access rights every time you add a new
partition to your system.