The Software Security Wizard guides the user in setting up the software
security policy and in assigning an administrator user. Using this security
policy all users will be managed by the application itself.
After selecting the security policy an administrator user needs to be
chosen. The administrator is always the first user that will be added
to the user management and he will perform all further user management
and security configuration steps. Using the administrator account for
regular operation of the software is not recommended, it is intended for
user management and security setup purposes only!
The administrator user needs to be selected
first!
The administrator manages all further security setup and user management
steps. This account is intended for managing purposes only and should
not be used for regular operation of the software.
Enter the name of the administrator user and a password for the administrator
account:
The administrator user has been configured now and the software needs
to be restarted. If the software does not restart automatically after
pushing the Finish
button, please restart
it manually by selecting the Start Menu
entry or the Desktop-Icon.
After restarting, the software will have finished the security policy
setup and the user will be welcomed by the login screen:
The administrator user needs to login with his user credentials and
will have access to the application with restricted functionality. The
administrator may then continue with the security setup:
The Data Access Control
setup can be executed immediately or at a later point in time. In addition
to the general security functions it will provide advanced user based
data access control. If your working environment does not require data
access control this setup can be skipped. Please review the chapter "Data Access Control" for further
information.
After software security wizard has completed successfully, the basic
security functions of the application are activated. The administrator
will have access to the application with limited functionality. The security
setup needs to be finalized by utilizing the following additional functions: