
Establishing Online Security
User Reference
Connectivity Systems, Inc.—Copyright © 2006
Use Pursuant to Company Instructions
2-63
$EPIC Unsecured profile. $EPIC, which cannot be modified, is
provided by the Online Manager to use as a model. After
$DEFSEC is secured, you can grant total system access to
selected users by modeling their user profiles after $EPIC.
Profiles modeled on $EPIC can be modified to create
custom security profiles. To prevent unauthorized access to
the Online Manager, you cannot use $EPIC as a user ID.
Use caution when modeling user profiles after $EPIC and
leaving the user profiles unmodified. If the user profiles are
left unmodified, a user can obtain the profile name and use
it to obtain total system access.
SJA SJA is an example of an unsecured profile that was modeled
after $EPIC.
User ID Definition
Kommentare zu diesen Handbüchern