MKS Help

Security & Access Management

This Help File Page was last Modified on 03/08/2015

Hide Navigation Pane

Security & Access Management

This Help File Page was last Modified on 03/08/2015

Previous topic Next topic No directory for this topic No expanding text in this topic  

Security & Access Management

This Help File Page was last Modified on 03/08/2015

Previous topic Next topic Topic directory requires JavaScript JavaScript is required for expanding text JavaScript is required for the print function Mail us feedback on this topic!  

Security related conversations, when talking with Security Professionals about how to provide the necessary protection levels and access rights for their business information, are always very interesting because they always have lots of opinions (options) on how best to provide the appropriate level of Security.

Everyone has a different view of how secure they should make their system (e.g., safe but useable).

They know that a high level of security usually means that Employees will experience a lot of security related inconvenience.

With the MKMS Security and Access Management system, it does not have to be that way!


All it takes is a little bit of planning.

Decide on what information does - and does not - need intensive security protection.

Identify the system entries that will enable your security protection plan.

These required system entries may include:

Setting up your security levels by establishing Security Groups.

Entering your individual Employees and their security assignments.

Entering User Name and Passwords so authorized Employees can login.

Fine tuning who can see what, set what, and do what, using User Access Rights.

Use of the Security option to maintain Passwords, and also to Login and Log out.

When completed, your Users will rarely be aware of the protections that have been put into place.


Important Note: A few words about how to deal with a departing Employee:

If you need to remove an Employee from the system (due to termination, death, transfer, etc.), and that Employee has ever been assigned to any record (e.g., an Invoice, a Work Order, as an Operator handling Alarm Activity) within MKMS:

Do not delete that Employee's record in the Employee Form (they are part of the transactional history of your Company).

Instead, enter an Employment Period Ends Date on the Personal tab of the Employee Form.

If that Employee had system access to Login as a User, delete their record from the Add/Delete Users Form so they can no longer access the system.


Overview of Security and Access Management steps:

1.Define Employee Groups - this allows you to grant, to any employee assigned to that group, specified Forms and the rights to create, read, update, and/or delete the information on those Forms.



Employee Groups Form with Members data displayed


2.Enter your Employees.



Employee Form - Personal tab


3.Using the Security tab on the Employees Form, assign each Employee to an Employee Group and  turn on any of the additional rights - offered in this tab - that they must have to do their job.



Employee Form - Security tab


4.Add these Employees to the system's Users file where you will assign them their Log In User Name and Password.



Add/Update Users Form


5.In the User Options Form on its Company Options tab, set the number of days before their Password Expires - thereby forcing them to periodically re-set it using the Change Passwords Form.

Passwords Expire? - Check this box if you want Employees to be required to periodically change their Password.

For UL® 1981 Users, this is Mandatory Requirement.

oPasswords must be changed at least every 90 Days.

oPasswords must be a minimum length of 6 alpha-numeric characters.




oUpon expiration, a Warning message is displayed which requires the User to immediately change their Password before continuing.



oOnce the new Password is entered, a confirmation message will be displayed.





Next, go to Employee Groups.