Security Rights & Roles
Your data is central to your organization, and should be protected. The Security Rights and Roles module can help you protect your data by providing you with the tools you need to control access to your data. The documents in the first two sections describe the features and give you the information you need to get started and implement those features. The remaining documents give you more detailed and specific information about various ways to use the Security Rights and Roles features.
Scenario: Shared Clients
The Shared Clients scenario assumes that all users of PortfolioCenter see all - or most - of the clients in the database. Access to the data is limited only by roles within your office. Use the documents in this section for guidance on configuring these scenarios.
Scenario: Individual Advisor
The Individual Advisor scenario assumes that data entry, operations and systems personnel have access to all data, but the individual advisors can only see the portfolios they manage. Use the documents in this section for guidance on configuring these scenarios.
Scenario: Advisor Teams
The Advisor Team scenario assumes that each advisor has his or her own data entry, operations and system teams and, although all the data is in the same database, the access for each team is limited to only the client-base they serve. Use the documents in this section for guidance on configuring these scenarios.
Practical Applications
You may have a specific security need not covered in one of the scenarios above or need additional security for certain items in the database. In this section, learn more about ways you can apply security to certain parts of your database.
- Practical Applications: Securing Report Profiles Using Security Rights and Roles
- Practical Applications: Securing Composite Sets Using Security Rights and Roles
- Practical Applications: Securing Batch Print Jobs Using Security Rights and Roles
- Practical Applications: Securing Rules Using Security Rights and Roles
- Practical Applications: Securing Views Using Security Rights and Roles
- Practical Applications: Securing Client Presentations Using Security Rights and Roles
Understanding Permission Definitions
The key to setting permissions correctly is to understand what permissions and rights can be granted and at what level. Use the documents in this section to understand permissions to apply them appropriately.
Understanding and Editing Security Profiles
In this section, learn more about the Security Profiles, how to create, and edit them.
Applying and Testing Permissions
In this section, learn more about applying permissions associating the Security Profiles with Users or User Groups, and then learn how to test those applied permissions using the Effective Permissions tab.