In Fortix any user that wants to use the system must be identified. Fortix uses a local database for the users’ accounts and credentials. Security administration in Fortix provides users (or groups of users) permission to access and perform tasks in different pages containing reports and other information components. For example, permission to create or change contact details. This article summarises the areas in Fortix that controls security.
User Login and password settings
Access is provided to the Fortix system with a login screen where the user is requested to provide a password. Refer to the article How to Add a New User for step by step instruction on how to set up the Login details.
Other security-related articles related to Login are: How to view a user’s Login Log
Role-based access in Fortix is a crucial feature to facilitate ease of use and security. Setting up input forms and reporting based on role simplify the page and displays only the information that is important to the position.
The following articles explain how to setup and use roles:
Auth Manager and Permissions
Profile Based access
Fortix enables both aggregation and segregation of data based on Profiles, useful for organisations that have various branches that share certain parts of local information.
An example of this is a head organisation that owns several smaller businesses or establishments. Each business must be treated separately. However, the head organisation should have the capability to view all data. Refer to the following article: How to create a Profile
Fortix allows users to authenticate using their Google Accounts. In Fortix any user that wants to use the system must be identified. Fortix uses a local database for the users’ accounts and credentials. Refer to the article Create Google Logon Details