Security Overview
- User logon and authentication (using user names and passwords)
- User authorization, implemented through roles and groups
- Session timeouts, which limit the amount of time a user can remain in a session without interacting with the program
- Operational and statistical reports
- Audit logs where you can view an application's entire processing history
Security administrators create and manage users using a compliant Lightweight Directory Access Protocol (LDAP) system. Authentication for Origination Manager is inherited from the LDAP server while user authorization is inherited through groups and roles.
A security administrator assigns roles (which define the operations that can be performed in the application) to groups. A security administrator then authorizes a user to perform particular operations either by assigning the user to certain groups, or by explicitly assigning certain roles to the user. Use the FICO Application Studio Designer to create roles (which represent permissions). Use the Application Processing Module system to create groups and manage and assign roles and groups to users. Users belonging to a group with the proper permissions are able to modify and delete users and groups.
![]() | See Also: For information on which LDAP servers are supported, see the
FICO Origination Manager Supported Platforms Guide. For information on how to use the
FICO Application Studio Designer to create roles, see the
Create a Roletopic in the FICO Application Studio Designer Help. |