User Access - Security Best Practices - Foundation 23.1 - Foundation 23.1 - Ready - OnBase - Essential - Premier - Standard - external - Standard - Essential - Premier

Security Best Practices

Security Best Practices
Foundation 23.1

The security of an OnBase environment starts with user access: allowing legitimate users to access the application while limiting the opportunities for intentional or unintentional malicious access that can harm the integrity of your data and users. User access can be divided into three related areas: authentication, authorization, and accountability.

Authentication is the verification of the identity of an individual in relationship to the application or system, typically through the use of a password. Identification is typically established with a user name.

Authorization determines what permissions and privileges an authenticated user has within the application or system. In OnBase, permissions and privileges allow the authenticated user to access different areas and functionality in the application, such as document retrieval, Workflow administration, and the ability to view and edit Keywords.

Accountability is the creation and maintenance of an accurate history for the authenticated user that is used to help determine what actions that user performed and when those actions were performed. Accountability means you can discover unwanted actions and prevent more of the same actions, and by tracing the actions back you increase the ability to recover from damaging actions. The concept of tracing an action back to the user or entity that performed it is known as non-repudiation. Accountability in OnBase is achieved through logs and document histories.