TariffShark Tiger User Guide

Not your version?

Permissions and Security

TariffShark permissions and security are managed through role-based access control and role-based security. Each User is assigned one or more Security Roles, and each Security Role is assigned one or more privileges (Authorized Functions) that are permitted to users in that role. Further, a user's assignment to a Security Role may apply to all Companies, to a specific Company and all Tariff Databases, or to a specific Company and Tariff Database. Security administration within TariffShark consists of determining the operations that must be executed by persons in particular jobs and assigning them to the proper security roles.

TariffShark ships with a set of predefined roles to simplify the initial security role administration process.

Security Role Details
Administrator This security role provides access to all TariffShark functions.
Configurator This security role allows users to configure TariffShark using such features as Record Numbering Schemes, Document Layouts, and Header Templates. This security role is only available for new client installs of TariffShark.
Editor This security role allows users to access most of TariffShark's commands needed to prepare tariff Filings.
Publisher This security role allows users to access TariffShark's publish and related functions.
Read Only This security role provides read-only access to TariffShark data.
Security Officer This security role allows users to administer security within TariffShark.

In addition to the role-base management, during the initial setup of the TariffShark Application Server an organization establishes a password for registering and unregistering software clients, password policies, exception notification policies, and session timeout policy. The work is usually done by server administrators per company policy.

See Also

ELEMENTS