When configuring who can access Security Center, you should first define the security partitions (responsibility boundaries), and then select the user groups and individual users who can access these partitions.
What you should know
While Security Center protects your company's assets (buildings, equipment, important data collected in the fields, and so on), your job as administrator is to protect the Security Center software against illegal access.
When securing access to your software, you should ask the three following questions:
- Who needs to use the system? – Which users and user groups can log on?
- What do they use it for? – What privileges must they have?
- Which parts of the system are they responsible for? – Which partitions must they have access to?
Best Practice: It is easier to define security partitions when you first set up your
system. That way, as you create entities in your system, you can place them directly
into the partitions where they belong. If you start by creating users first, you might
end up having to revisit their access rights every time you add a new partition to your
system.