SlideShare a Scribd company logo
Access Group -SAMS V2




              Author: Lavina D’Souza
Objective
 The new feature called “Access Group” implemented in SAMS –V2
 is a group of Devices of different Locations.

 Access Groups are used to                assign    Access    permissions       to
 Employees of an organization.

  Key Points:
  1. Selection of multiple Devices of different Locations.
   2. Send for Approval : If the Access group is assigned to an Employee, an
                          Email notification will be sent to an authorized person.
                          The Employee will get access only if the authorized
                          person approves the Access request.
Main page of Access Group looks as shown below:
To create an Access Group
   In the application menu bar, Click on “SACS” “Access Group”.
   In the Access group window,
 1. Enter the name.
 2. Check the required Locations.
 3. Based on the selected locations, the Devices configured for the Locations will
    be displayed.
 4. Check the required Devices.
 5. If required , click on “Is Approval needed” and select the “HOD” and “Deputy
    HOD”.
 6. Save the Data.
Once the data is confirmed, the Access group can be assigned to Employees and access will be
granted to the Employees for the configured Locations.
Thank You

More Related Content

Viewers also liked

Total Mobility Law: January 2013
Total Mobility Law: January 2013Total Mobility Law: January 2013
Total Mobility Law: January 2013
Todd M. Heine, J.D., LL.M., M.Ed.
 
SPYDERLINK
SPYDERLINKSPYDERLINK
SPYDERLINK
rjohnsoncpm
 
Str 581 guide 3 73) Which of the following does not appear as a separate sect...
Str 581 guide 3 73) Which of the following does not appear as a separate sect...Str 581 guide 3 73) Which of the following does not appear as a separate sect...
Str 581 guide 3 73) Which of the following does not appear as a separate sect...
sankarananthcj
 
02.01 power point
02.01 power point02.01 power point
02.01 power point
amyfwest
 
Paul saquicela publicidad power point
Paul saquicela   publicidad power pointPaul saquicela   publicidad power point
Paul saquicela publicidad power point
Paul Xavier Saquicela Alvarado
 
Story board
Story boardStory board
Story board
Opilona
 
Marine art
Marine artMarine art
Marathon overview
Marathon overviewMarathon overview
Marathon overview
Marathon Consulting
 
Intermediacion financiera
Intermediacion financieraIntermediacion financiera
Intermediacion financiera
Ruth Huapaya Neiira
 

Viewers also liked (10)

Usb idazteko plantilla
Usb idazteko plantillaUsb idazteko plantilla
Usb idazteko plantilla
 
Total Mobility Law: January 2013
Total Mobility Law: January 2013Total Mobility Law: January 2013
Total Mobility Law: January 2013
 
SPYDERLINK
SPYDERLINKSPYDERLINK
SPYDERLINK
 
Str 581 guide 3 73) Which of the following does not appear as a separate sect...
Str 581 guide 3 73) Which of the following does not appear as a separate sect...Str 581 guide 3 73) Which of the following does not appear as a separate sect...
Str 581 guide 3 73) Which of the following does not appear as a separate sect...
 
02.01 power point
02.01 power point02.01 power point
02.01 power point
 
Paul saquicela publicidad power point
Paul saquicela   publicidad power pointPaul saquicela   publicidad power point
Paul saquicela publicidad power point
 
Story board
Story boardStory board
Story board
 
Marine art
Marine artMarine art
Marine art
 
Marathon overview
Marathon overviewMarathon overview
Marathon overview
 
Intermediacion financiera
Intermediacion financieraIntermediacion financiera
Intermediacion financiera
 

More from lavinads

Guard tour management
Guard tour managementGuard tour management
Guard tour management
lavinads
 
Guard tour management
Guard tour managementGuard tour management
Guard tour management
lavinads
 
Sams e lite
Sams e liteSams e lite
Sams e lite
lavinads
 
iSAMS dashboard
iSAMS dashboardiSAMS dashboard
iSAMS dashboard
lavinads
 
Sql script update
Sql script updateSql script update
Sql script update
lavinads
 
Sql Script Explorer
Sql Script ExplorerSql Script Explorer
Sql Script Explorer
lavinads
 

More from lavinads (6)

Guard tour management
Guard tour managementGuard tour management
Guard tour management
 
Guard tour management
Guard tour managementGuard tour management
Guard tour management
 
Sams e lite
Sams e liteSams e lite
Sams e lite
 
iSAMS dashboard
iSAMS dashboardiSAMS dashboard
iSAMS dashboard
 
Sql script update
Sql script updateSql script update
Sql script update
 
Sql Script Explorer
Sql Script ExplorerSql Script Explorer
Sql Script Explorer
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Sams v2 access group

  • 1. Access Group -SAMS V2 Author: Lavina D’Souza
  • 2. Objective The new feature called “Access Group” implemented in SAMS –V2 is a group of Devices of different Locations. Access Groups are used to assign Access permissions to Employees of an organization. Key Points: 1. Selection of multiple Devices of different Locations. 2. Send for Approval : If the Access group is assigned to an Employee, an Email notification will be sent to an authorized person. The Employee will get access only if the authorized person approves the Access request.
  • 3. Main page of Access Group looks as shown below:
  • 4. To create an Access Group  In the application menu bar, Click on “SACS” “Access Group”.  In the Access group window, 1. Enter the name. 2. Check the required Locations. 3. Based on the selected locations, the Devices configured for the Locations will be displayed. 4. Check the required Devices. 5. If required , click on “Is Approval needed” and select the “HOD” and “Deputy HOD”. 6. Save the Data.
  • 5. Once the data is confirmed, the Access group can be assigned to Employees and access will be granted to the Employees for the configured Locations.