Configuring Security

Complete the following procedures to configure Security. Configuration procedures are completed in CSM Administrator.

To configure Security:

  1. Configure System Settings security rights: Configure who can configure system settings.
  2. Configure Application security rights: Configure who can access general application functionality (ex: Who can access Table Management, who can create custom toolbars etc.).
  3. Configure System Security settings: Configure general security settings (default domain and anonymous login); login modes, authentication, and inactivity settings for each client; login settings for mobile applications (Cherwell Mobile); and password enforcement rules.