Configuring Security
Complete the following procedures to configure Security. Configuration procedures are completed in CSM Administrator.
To configure Security:
- Configure System Settings security rights: Configure who can configure system settings.
- Configure Application security rights: Configure who can access general application functionality (ex: Who can access Table Management, who can create custom toolbars etc.).
- Configure System Security settings: Configure general security settings (default domain and anonymous login); login modes, authentication, and inactivity settings for each client; login settings for mobile applications (Cherwell Mobile); and password enforcement rules.