Download Data Sheet
Simplify administration while increasing system activity
Establishing and maintaining end-user security profiles for enterprise-wide applications can be an overwhelming task for system administrators. Without the right tools, it is often time consuming, costly and frustrating.
glovia G2 Security Manager is an easy-to-use front end to glovia G2's existing security capabilities. It provides system administrators and managers with a way to intelligently control all end-user access to glovia G2's functionality while greatly reducing administrative overhead and operational complexity.
The glovia G2 Security Manager provides significant benefits:
- More precise control over functionality access
- Reduced security administration time and cost
- Increased flexibility in defining and reusing security roles
- Improved auditing, reporting, and inquiry capabilities
Powerful yet Flexible System Security
Security Manager provides easy access to glovia G2's native, function-level security capabilities, providing administrators with a flexible way to manage security settings, such as granting or restricting end-user access to specific glovia G2 functionality. When a user is not authorized for a specific functionality, the associated menu choices are grayed out, prohibiting their access. This is true for normal menu navigation, as well as for all numeric short cuts. Even explicitly entered functions are prohibited from running when they are not authorized. In addition, both successful and failed accesses are logged and time-stamped for audit review.
The time zone feature allows the glovia G2 client to present dates and times in a local time. This means that dates and times can be displayed and processed in a local time and stored to the server in a consistent manner.
Single Sign-On (SSO)
Security is made even easier now with the addition of Single Sign-On. SSO capabilities are provided based on Microsoft Windows based Active Directory via secured LDAP. This capability provides for the 'Provisioning', i.e., mapping, of Active Directory users to glovia G2 users by way of a simple drag and drop solution.
Single Access Profile for User Roles
One of the biggest headaches for administrators is establishing and maintaining security profiles for each individual end-user. Security Manager overcomes this problem by enabling administrators and managers to easily define group or role-based security profiles.
For example, an administrator can quickly use Security Manager to define a group or role, such as "AP Clerk," as well as determine all of the access privileges and rights for that role. This newly defined profile can be applied to any end-user, greatly simplifying security administration. Security profiles, of course are fully customizable.
Security Manager also permits individual-level, exception-based security profiles. Administrators can quickly alter existing profiles to grant or restrict access for specific individuals. For example, the role of "AP Clerk" can be easily customized so that all users have data entry rights, but only one user can access glovia G2's check cutting functionality. This capability allows administrators to increase the usability of glovia G2 without jeopardizing overall system security.
Integrity Reporting and Audit Trail
Security Manager provides powerful reporting and management capabilities. The module's inquiry functionality allows administrators to determine quickly which end-users have access to specific functionality as well as how frequently that functionality has been used. The reporting also provides a full security audit trail, including a comprehensive archive of all relevant data. The audit trail allows administrators to track critical information, such as successful and unsuccessful user attempts to log onto specific glovia G2 functionality.
- Single Sign-On capability
- Single, easy-to-use interface for all glovia G2 security operations
- Built on native functionality-level and menu-based glovia G2 security
- Compatible with glovia G2 shortcuts and text commands
- Fully definable and customizable security profiles—including group, role, exception and meta-role
- Comprehensive inquiry, reporting, and auditing capabilities
- Reduces navigation path of users to their intended roles
- Time zone recognition and maintenance