Working with Users
Neurons for ITSM has two user types, enabling a flexible user management interface. You cannot create, modify, or delete these types. These types are:
•Employee: A user that is independent of any specific business objects. Its unique field is LoginID. The application stores and authenticates employees by their user name and password. Employees can log into the application and can be linked to and from other business objects. Employees can be internal or external users, depending on your configuration.
•External Contact: An external contact is independent of any specific business object. Its unique field is email address. External contact user passwords are not stored in the database. External contacts cannot log into the application, but can be referenced by other business objects. For example, an external contact named "Vendor" who reports an incident can be referenced within the incident (in the CreatedBy field).
This structure enables more complex security and access control scenarios:
•Self-Service Portal access for external users.
•Service Desk Analysts can create an incident or service request on behalf of an external user or entity.
•Greater flexibility to model new types of identities and contacts.
•Separation of identity, contact, and organization concepts.
•Visibility and access to business objects in security scopes that encompass hierarchical and horizontal relationships between entities linked to the service delivery.
For information about adding users to the application and assigning users to roles, see Adding Users to the System and Assigning Roles to Users.