MC Corporate LOS Administration Training: Axe IAM (Identify & Access Management)

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Virtual Presenter] Good afternoon everyone and welcome to this presentation on Access Profiles. In this session I will provide an overview of how Access Profiles work and the benefits that come with implementing them. I am eager to further explore this important topic today..

Scene 2 (17s)

[Audio] User management is essential for access control. It categorizes users into different groups and provides them with specific access rights. This helps segregate the company and grant suitable privileges to each user and group. This tailor-made system allows us to create a system that fits the particular requirements of the organization. Access profiles let users modify their own access to the system and this info can be archived and retrieved when the user logs in providing security for our data while allowing for versatility in our system..

Scene 3 (52s)

User Management. User. A|. 3|. 2|. Agenda. Business Segmentation.

Scene 4 (1m 2s)

[Audio] AxeIAM is a comprehensive solution for businesses that need to secure their user access and assign roles. It ensures that only the right people can access the right data and resources while also enabling accountability for user actions. It helps protect against data loss and security breaches as well as unauthorized access attempts. With AxeIAM businesses can create user profiles according to the user's specific requirements and these profiles are automatically applied at login. This helps increase efficiency and ensures users have access to the features they will need. In conclusion AxeIAM is an essential element of any organization's plan for access control and security..

Scene 5 (1m 46s)

[Audio] User management is a significant component of I-A-M platforms when it comes to user access and roles. Creating user profiles is an efficient way of determining the access rights for each user with the capability of quickly saving and calling back the information whenever the user logs in. Additionally business segmentation is an integral part of I-A-M systems providing companies the ability to define and supervise which parts of the system each user has access to. I-A-M platforms can guarantee a secure environment for user access and roles with personalized user profiles and business segmentation..

Scene 6 (2m 22s)

[Audio] User management system in A-C-P consists of three main components users roles/groups and profiles. All of them work together to create a secure and organized environment in which users can complete their jobs efficiently. Information required from users include their email addresses for notification purposes full names business segments for data visibility control and assigned positions. This information enables us to determine user rights and privileges for increased data security..

Scene 7 (2m 53s)

[Audio] In order to create a new user profile in the Access Profile System first ensure that the user does not exist in CLOS. Then enter the name of the user in the selection box and click 'enter'; the bank's Active Directory will provide a list of possible entries. Choose the correct one and click on the line of the desired user to proceed to edit. This enables you to create a suitable profile for the user..

Scene 8 (3m 19s)

[Audio] The Edit form sub-tab in the Edit User Base information allows users to customize their access to the system. This sub-tab stores the core information of each user such as their domain name shortname and Active Directory name. This information is retrieved from the client's Active Directory and can be used to control user access levels and roles helping to ensure optimal data security..

Scene 9 (3m 46s)

[Audio] User Management is the practice of managing identities and permissions for individuals within an organization. This involves creating configuring and enabling or disabling user profiles and access rights for each user. It is important to make sure that users are given the correct access to the system according to their requirements and no extra access is granted. User Management is divided into three categories. The first is User Level control allowing users to have individual rights and allowances. The second is Profile Level control allowing administrators to configure access and roles for all users within a profile. Lastly Role Level control grants access to department or business unit groups. All these categories are integrated into Access Profiles for improved user experience and security..

Scene 10 (4m 36s)

[Audio] Access Profiles play a crucial role in controlling user access to A-C-P functionalities. These profiles are tailored to each user giving them specific access rights and permission to interact with the system. For example you could define a "Read-only" profile that only allows users to view data without being able to Edit Delete or Create. Other profiles may allow users to Read Create Update Delete and Run Workflows. All profiles are designed to ensure users are able to fulfill their role effectively and securely while preventing unwanted access or manipulation of data. Please refer to the following section for more details on Access Profiles..

Scene 11 (5m 18s)

[Audio] Users are able to customize their access to the system by using the PROFILE tab. This tab includes an "Info" button on the right side which can be clicked to modify the profile. Upon making the desired changes the "Save" button should be clicked to make the profile active. Setting up individualized access profiles is an effective way for organizations to provide their employees with the right level of access while maintaining data security..

Scene 12 (5m 44s)

[Audio] When editing a User you can set the access rights for each Profile assigned to them. To do this go to the "Edit User" tab and select the "Profiles" sub-tab. On this page you will be presented with two panels. The left panel lists all of the Profiles available and the right panel lists the Profiles already assigned to the user. To assign a Profile select it from the left panel and click the '>' button to move it over to the right panel. To remove a Profile select it from the right panel and click the '<' button to move it back to the left panel. You can assign multiple Profiles to a user to give them the access rights necessary to the system..

Scene 13 (6m 15s)

[Audio] User management is essential for maintaining the security and integrity of the system. Access Profiles allows for customized access and roles for each user. These access profiles can be saved and retrieved when the user logs in and all user access is then managed in three sections; Profile Access Rights and Role. The Profile section gives an overview of all users in the system Access Rights provides access to different parts of the system and Role (Group) determines user group access levels..

Scene 14 (6m 51s)

[Audio] The Access Rights module allows users to be granted specific accesses for each Screen/Tab/Field/Button. Access to A-C-P (Access Control Panel) only occurs when the user has been assigned one or more profiles. In cases where a user has access to more than one profile access is determined by the sum of the access rights granted to each profile..

Scene 15 (7m 16s)

[Audio] A Profile selected by the user opens a window with multiple tabs containing the permissions the user has to the various screens of the system. Permissions can be defined as visibility or action-based and the user controls the accessibility of the screens with the profile they have chosen. This grants the user full control over their user access and roles in the system..

Scene 16 (7m 39s)

[Audio] The user's access right profile is highly customizable as it allows for customizing the visibility access of the user alongside the permission columns of Read Create Update Delete and Run Workflow. To customize the profile one can click on the E-D-I-T button on the right side of the screen opening a new screen with all the fields associated with it. It is also possible to check or uncheck a field or all fields at once with the "Check All" button customizing the profile to each user's desired needs..

Scene 17 (8m 11s)

[Audio] User profiles are essential for data security in IT systems. Access Profiles enable users to customize their access rights and roles as needed. When a user logs in this profile information is saved and retrieved to provide secure and simplified access. Access Profiles are a great way to segregate businesses and give an overview of user privileges and roles. This provides secure and personalized access for all user groups..

Scene 18 (8m 41s)

[Audio] Creating individual roles in an Access Profile is essential to ensure user safety and security. Roles provide an organized structure that makes assigning tasks routing workflows and identifying supervisors simple and efficient. Once these roles are established users can be allocated to them with the ability to identify supervisors. Supervisors take on the responsibility to assign tasks reviews and task executions within workflows for smooth operation. All assignments have a checkbox option that tells whether the user is a supervisor or not..

Scene 19 (9m 19s)

[Audio] User management is an essential component of an I-A-M system. Axe I-A-M offers a user management system that allows customization of access profiles and roles for each user with data stored to ensure delivery of previously granted access upon login. Business segmentation can also be used for viewing user data in varied ways granting an accurate synopsis of user activity. Access profiles facilitate assignment of access rights groups and roles allowing safe and efficient management of user access depending on their individual needs..

Scene 20 (9m 53s)

[Audio] Data visibility and access must be organized according to the bank's policy in order to have a successful data security system. The A-C-P solution offers a comprehensive Chinese Wall rule to construct a virtual barrier to guard data exchange and manage access according to user eligibility criteria. Furthermore the Business Segmentation feature allows for a structured hierarchy of the bank to meet operational criteria such as segment criteria geographic criteria and more..

Scene 21 (10m 23s)

[Audio] A-C-P provides users with the ability to personalize their access to the system and add different business segments under an entity. This provides users with the option to have specific rights and permissions such as the ability to view edit or delete data providing increased control over the system and better data security. Additionally users can save their access profiles and when they log in again they can retrieve them making the process more efficient and secure..

Scene 22 (10m 52s)

Axe IAM (Identify & Access Management): Business Segmentation-Chinese wall mechanism.

Scene 23 (10m 59s)

[Audio] A user's access to the system can be tailored to their own needs on the Access Profile tab. This personal data is stored and retrieved quickly each time a user logs in. An additional feature allows for assignment of users to specific business segments thus providing secure access control. Axe IAM's advanced technology guarantees top data security and limitation of access to the user's precise role..

Scene 24 (11m 24s)

Thank you.