Manage users and groups through ICS software
- Last UpdatedJul 19, 2024
- 1 minute read
Your ICS software should have a built-in security system that controls who may use the software and what privileges they have.
Users should be assigned permissions that determine what each user is authorized to do within the ICS system. Permissions can be managed either on a per-account basis or on a group basis by making use of roles. Group or role-based access control is preferred as it greatly simplifies management. Users can be moved from one role to another as the organization's needs change, and can also be members of multiple roles if required.
Each user should have their own user account with a unique user name and a strong password. The user account can then be assigned to one or more groups.
Accounts should always be assigned the least privileges necessary to perform their functions. Accounts with Windows Administrator permissions should be reduced to the minimum, and typically only used to install and configure the software. Likewise, accounts with SQL Server SysAdmin privileges should be reduced to the minimum, and typically only used to install and configure the software.
In most cases, the ICS software will allow associating Windows Groups with roles within the product. While defining and assigning roles, consider the following:
-
Roles should be defined to have the least privileges necessary for their functionality.
-
Roles should be limited to a single purpose in order to simplify the permissions assigned to them.
-
Users can be members of multiple roles if necessary.