Did you know… you can control Security settings for processing records, accessing record types and features, and communicating about records and users, in System Configuration of Blue Mountain RAM?
- Security for Adding, Editing, Signing, and Processing Records – Blue Mountain RAM’s Rule System enables you to control your records. An unlimited number of rules can be created for each record type, so you can control it as you wish for as many circumstances as it will face at your organization. Each rule has its own independent configuration and security settings. Rule security settings may be applied to any combination of individuals, groups, and personnel fields (listing a personnel field dynamically affects whoever is listed in the field on the affected record). For example: the person(s) authorized in a work record’s rule security to sign to close the work order, could be “Bob”, anyone in the “Supervisors” group, and/or whoever is listed in the affected equipment’s “Owner” field. It is the same set of security choices for adding, editing, and other processing tasks of records.
- Security for Accessing Records and Features – Each site and dataset has its own set of security choices for who may access the records and features of your Blue Mountain RAM. Security configuration is granular, affording you the ability to apply either uniform or individualistic security settings. For example: choose whether users have access rights (access rights are view-only rights) to all record types or just those record types with which they work. Another example: choose whether users/groups can use the Query Design Feature (to build queries) at all, for just the record types with which they work, or for all record types. Further, choose whether they can share the query designs they create with other users/groups or not.
- Security for Communications – Blue Mountain RAM can communicate a broad spectrum of information. Besides choosing what information you wish to communicate (new asset added, work due, signature required, work failed, part needs reordered, etc.), you also choose what communication security you wish to apply: who receives the notification? Designate any combination of individuals, groups, and fields, as the recipients of notifications concerning records. For notifications that do not concern records, the “field” option is not available (as there are no fields). Designate users and/or groups. An example of a non record related notification would be: “User has failed logon.”
For further information, consult your Blue Mountain RAM Administrator Manual. If necessary, contact us for downloads of PDFs of the manuals. Consider attending a Blue Mountain Regulatory Asset Manager Training to learn about this subject as well as many, many more! Visit www.coolblue.com to learn more about training and schedules.