Navigation: Security Screens >
The Security > Setup screen in CIM GOLD is the main screen used to set up security for employees, tellers, or profiles in order to use CIM GOLD and other GOLDPoint Systems programs.
This screen is composed of a list displaying all employees/tellers/profiles currently set up on the system, as well as five tabs to enable security for specific screens, fields, and systems. See the following example of this screen:
The Setup screen allows you to set up:
•Security for employees and tellers.
•Security for a profile, then tie employees to that profile.
•Security for CIM GOLD screens.
•Security for System screens.
•CIM GOLD Field-level security.
Note: To delete an employee, you must set their Status to "Terminated," and then use the Security > Terminated Employee Deletion screen to delete the employee from the system. |
---|
The copy button only works if you've selected the CIM GOLD Profile or System Profiles radio buttons. Select a CIM GOLD or System profile in the drop-down list, then click this button to copy the security settings from the profile to the employee. Copying a profile detaches an employee from the profile. Future changes to the profile will not be shared with the employee.
The following list shows the screen order in which security must be set up within CIM GOLD, so that security will work properly for your institution and employees.
1.Subscribe to Mini-Applications: Before security setup, your institution must subscribe to all applications and screens your institution will use.
2.Company Options - The fields on this screen define your institution name, length of employee numbers and passwords, days to force security code (password) changes, and minutes of inactivity to timeout CIM GOLD and other GOLDPoint Systems products.
3.Setup - This screen ontains setup fields for employee, profile, teller, CIM GOLD screens, System screens, and Field-level security. If your institution chooses to use profiles, they must be set up before setting up individual employees.
Additionally, you can use the Reports screen to view who has access to which screens and other security reports. |
See the table below for information about the basic fields on this screen. Links to the tabs on this screen are listed below the table.
Field |
Description |
Click on this radio button to view existing employees in the Security Setup list view (see below). You can also click on this button to add or edit security for employees.
If this radio button is selected, you can use the Employees to Show radio buttons to the right to indicate whether the list view should display Active employees only, Inactive employees only, or All employees. See Status for more information about these employee statuses.
For more information on setting up security for employees, see the Employee tab help.
Note: To delete an employee, you must set their Status to "Terminated," and then use the Terminated Employee Deletion screen to delete the employee from the system. |
|
Click on this radio button to view existing tellers in the Security Setup list view (see below). You can also click on this button to add or edit security for tellers. For more information on setting up security for tellers, see Tellers |
|
Click on this radio button to view existing CIM GOLD profiles in the Security Setup list view (see below). You can also click on this button to add or edit CIM GOLD profiles. For more information on setting up CIM GOLD profiles, see the CIM GOLD Profile tab help. |
|
Click on this radio button to view existing System profiles in the Security Setup list view (see below). You can also click on this button to add or edit System profiles. For more information on setting up System profiles, see the System tab help. |
|
Effective security shows what options employees have access to because of their own security settings and because of all the profiles to which they belong. When you uncheck the box, you only see the security of their own (if the Employees radio button is selected at the top of the screen) or security tied to their profile (if the CIM GOLD Profiles or System Profiles are selected).
IMPORTANT: To change security settings, you must uncheck the box. If this box is checked, many fields cannot be changed, and a message appears next to fields notifying you that you cannot change information while this box is checked, as shown below:
Profiles are selected for individual employees using the Interface Profile drop-down field on the Employee tab. |
|
Type the first letter or letters of a User Name to quickly find it in the Security Setup list view (see below). Use this feature to find a specific user name, teller name, or profile name. |
|
This list displays the names of employees, tellers, or profiles set up at your institution. Click on the appropriate radio button above (Employees, Tellers, CIM GOLD Profiles, System Profiles) the list to view items of that type. |
Record Identification: The fields on this screen are stored in the FPSM record (CIM Access Profile Rec). You can run reports for this record through GOLDMiner or GOLDWriter. See FPSM in the Mnemonic Dictionary for a list of all available fields in this record. Also see field descriptions in this help manual for mnemonics to include in reports. |
---|
In order to use this screen, your institution must:
•Subscribe to it on the Security > Subscribe To Mini-Applications screen.
•Set up employees and/or profiles with either Inquire (read-only) or Maintain (edit) security for it on the CIM GOLD tab of the Security > Setup screen. |