Navigation: CIM GOLD User Guide >
Before you can use CIM GOLD, security must be set up for each employee who will use CIM GOLD. Security for CIM GOLD is set up in the CIM GOLD application under Security in the left tree view, as shown below:
Only your institution's security administrator will have access to these screens.
See any of the following topics for more information concerning the screens under Security:
•Subscribe to Mini-Applications
Security Setup Order
The following list shows the order in which security must be set up within CIM GOLD so that security will work properly for your institution and employees.
Note: GOLDPoint Systems must add security for your institution’s Security Administrator before employee security setups can begin. This is usually done before your institution converts to GOLDPoint Systems. Contact your GOLDPoint Systems account manager if your Security Administrator ever has questions or issues with setting up security: (888) 477-0099. |
---|
1.Subscribe to Mini-Applications — Before security setup, your institution must subscribe to all applications and screens your institution will use.
2.Company Options — The fields on this screen define your institution name, length of employee numbers and passwords, days to force security code (password) changes, and minutes of inactivity to timeout CIM GOLD and other GOLDPoint Systems products. Company Options are found on the CIM GOLD Security > Company Options screen.
3.Setup — Contains setup fields for employee, profile, teller security, CIM GOLD screens, and field-level security. If your institution chooses to use profiles, they must be set up before setting up individual employees.
4.If you want to run reports to see who has access to which screens, as well as what security options were changed, use the Reports screen.