QAD Access Security Plan Checklist
In a recent webinar, QAD Access: Concerns and Considerations, presenter Don Lindsey included a to-do list of tasks that should be considered before you embark on setting up your permissions and roles in QAD.
You’ll find a downloadable pdf of this graphic here: Security Plan Checklist
Don’s checklist includes:
Review, Determine and Understand How Your Enterprise is Organized
- Create a high-level overview of your business environment, including information about multiple sites, multiple domains, licenses, etc.
- Review all security documentation, including .Net, email security, the board of directors’ requirements, etc.
- Reassess all application-related files to determine appropriate permission & ownership settings
- Document any Segregation of Duties policy requirements
Determine, Define and Document User Access
- Detail the system domains/entities that users will need to access
- Document the roles to which users should be assigned
- Specify the Fields, Sites, GL Accounts, Inv Move Codes, etc. that users need to access
- Define policies and procedures for deactivating old user accounts
- Determine policies and procedures to assure user/role information is kept current
Detail Password Policies and Procedures
- Document the process for new user account and password creation
- Decide if single sign-on will be enabled
- Determine how often users are required to change passwords
- Define failed login attempt procedures
To learn more about Roles and Permissions, watch our webinars on the subject here:
QAD Access: Concerns and Considerations
Implications of QAD Roles and Responsibilities
Improve QAD menu security maintenance, audit and analysis with Data Loader