SlideShare a Scribd company logo
1 of 18
Download to read offline
Security Clearance
Presented by:
Kevin Prow, Chief Information Officer
William Dewey, Implementation Manager
Security Roles (Enterprise)
• “Sec Roles”
• Users can have many security roles
• Gives access to forms, reports, document types, functions, customer
statuses, widgets
• Prohibits access to document types, custom data fields
• Denies read/write permissions on certain fields on forms
Security Roles (Enterprise)
John Doe (Service Rep)
ServiceRep
Priority: 10
PayClerk
Priority: 100
I9 Restricted
Priority: 50
Everify
Priority: 30
• Allows uploading I-9s
• Prohibits viewing I-9s
• Can not run E-Verify
• Allows viewing I-9s
• Prohibits deleting I-9s
• Can run E-Verify
• Prohibits viewing I-9s
• Prohibits uploading I-9s
• Prohibits deleting I-9s
• Cannot run E-Verify
• Allows viewing I-9s
• Allows uploading I-9s
• Allows deleting I-9s
• Can run E-Verify
What can John Doe do with I-9 documents?
Security Roles (Enterprise)
• Challenges
• Conflicting permissions
• Determining why something is/isn’t available
• Difficult to administer (tends to need Support assistance)
• Hard to report on/audit
Security Groups (Beyond)
• Security Groups
• Multiple “Types” of Groups:
• Permissions
• Document Types
• Customer Status
• Reports
• Saved Searches
• Custom Data
• Data Exports
• Message Action Types
• One group, per user, per type
• Single source of truth
• Exposed via the TempWorks API for vendors/integrations
• User-administrable
Security Groups (Beyond)
John Doe (Service Rep)
Document Types Permissions Reports
• Resume: Read, Write, Delete
• I9: Read, Write
• W4: Read, Write
• Can create and edit
E-Verify cases
• Can assign onboarding
workflows
• Expired I-9s Report
Security Groups vs. Teams
• Security Groups
• Control access
• Each person is part of one
security group, for each type
of security group
• Not for reporting
• Teams
• New concept in Beyond
• Logical groups of people
• Used in reporting
• Used for distribution, such as
tasks
• Has “owners”
• Can be part of multiple teams
• Can own multiple teams
• Doesn’t impact permissions
Teams
VP of Sales
Sales Manager – West Sales Manager – East
Salesperson #1 Salesperson #2 Salesperson #3 Salesperson #4
Bridge Admins
• Bridge admins are the people who can call
TempWorks and make decisions like;
• Make mass changes to your system
• Approve custom report
modifications
• Make security changes
• Approve billable time
• What does a bridge admin need to know?
• Understand how to administer
security within Enterprise, Beyond &
other TempWorks products.
• Understand the roles your users
need when using the TempWorks
products.
HAVE NO
IDEA WHAT I
AM DOING
Step 2
Use our readily available tools to learn about security
• Try searching our knowledge base
• Try using our community form
• Come to a super awesome security presentation at The Works
• Still confused? Contact a TempWorks representative.
Step 2
Understand the issue you are trying to solve
• Getting details around a scenario is very important when trying to find an
answer.
• Think about possible solutions you may already know.
Step 1 Don’t Panic
Understanding
Permissions in
Beyond
Security Group Type -
Permission
• Can edit
customer
default worker
comp codes
• Can create
employee EEO
information
• Can read
employee EEO
information
• Can update
employee EEO
information
• Can
administrate
• Can
administrate
security groups
• Can Mass
Update
Assignments
• Can Mass
Update Rates
• Can access time
entry area
Security Group Type – Document Type
• The document type security
group gives security groups
the ability to mark specific
TempWorks documents
types as;
• The ability to see something
(Can Read)
• The ability to change
something (Can Write)
• The ability to remove
something (Can Delete)
Security Group Type –
Customer Status
• Customer Status security
groups are used to grant
service representatives the
ability to change customer
status from one of the
associated customer
statuses.
• Useful for controlling the
workflow of a customer’s
development.
Security Group Type - Reports
• Reports security groups are
used to grant service
representatives access to a set
of reports.
• Beyond gives you the ability to
assign a “Group” of reports or
you can individually select
which reports you want to give
access to.
Security Group Type –
Custom Data
• Custom Data security
groups are used to limit
service representatives
access to read/write access
to custom data properties.
• Restrict the ability to see
the custom data (Deny
Read)
• Restrict the ability to edit
the custom data (Deny
Write)
Security Group Type – Message Action Type
• The Message Action category
sets which message action
codes a service rep can log.
• For each message action type,
you can select whether the
service rep can view (read) or
post (write) a message with
that action type.
Security Clearance – Q & A
Presented by:
Kevin Prow, Chief Information Officer
William Dewey, Implementation Manager

More Related Content

Similar to The Works 2019 - Breakout Session: Security Clearance

Data integrity 03.pptx
Data integrity 03.pptxData integrity 03.pptx
Data integrity 03.pptx
AyeCS11
 
Microsoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification TrainingMicrosoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification Training
David Blumentals
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
North Texas Chapter of the ISSA
 

Similar to The Works 2019 - Breakout Session: Security Clearance (20)

Data integrity 03.pptx
Data integrity 03.pptxData integrity 03.pptx
Data integrity 03.pptx
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Microsoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification TrainingMicrosoft Dynamics CRM Certification Training
Microsoft Dynamics CRM Certification Training
 
How to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris ZulloHow to be a Security Minded Admin by Chris Zullo
How to be a Security Minded Admin by Chris Zullo
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
 
Dell and Deloitte: Managing Risk in the Cloud with Salesforce
Dell and Deloitte: Managing Risk in the Cloud with SalesforceDell and Deloitte: Managing Risk in the Cloud with Salesforce
Dell and Deloitte: Managing Risk in the Cloud with Salesforce
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
Survey of file protection techniques
Survey of file protection techniquesSurvey of file protection techniques
Survey of file protection techniques
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Quality attributes in software architecture
Quality attributes in software architectureQuality attributes in software architecture
Quality attributes in software architecture
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021Working securely with Microsoft Teams - Techorama 2021
Working securely with Microsoft Teams - Techorama 2021
 
Designing Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase SecurityDesigning Flexibility in Software to Increase Security
Designing Flexibility in Software to Increase Security
 

More from David Dourgarian

More from David Dourgarian (20)

The Works 2019 - Breakout Session: Mission Strategy and Operational Changes
The Works 2019 - Breakout Session: Mission Strategy and Operational ChangesThe Works 2019 - Breakout Session: Mission Strategy and Operational Changes
The Works 2019 - Breakout Session: Mission Strategy and Operational Changes
 
The Works 2019 - Breakout Session: Under Surveillance: Clues to Rethink Your ...
The Works 2019 - Breakout Session: Under Surveillance: Clues to Rethink Your ...The Works 2019 - Breakout Session: Under Surveillance: Clues to Rethink Your ...
The Works 2019 - Breakout Session: Under Surveillance: Clues to Rethink Your ...
 
The Works 2019 - General Session: The Back Office Black Book
The Works 2019 - General Session: The Back Office Black BookThe Works 2019 - General Session: The Back Office Black Book
The Works 2019 - General Session: The Back Office Black Book
 
The Works 2019 - General Session: Integration Partner Secrets Decoded
The Works 2019 - General Session: Integration Partner Secrets DecodedThe Works 2019 - General Session: Integration Partner Secrets Decoded
The Works 2019 - General Session: Integration Partner Secrets Decoded
 
The Works 2019 - General Session: Mission Control: New Asset Debrief
The Works 2019 - General Session: Mission Control: New Asset Debrief The Works 2019 - General Session: Mission Control: New Asset Debrief
The Works 2019 - General Session: Mission Control: New Asset Debrief
 
The Works 2019 - General Session: Top Secret Security Clearance: Primary Miss...
The Works 2019 - General Session: Top Secret Security Clearance: Primary Miss...The Works 2019 - General Session: Top Secret Security Clearance: Primary Miss...
The Works 2019 - General Session: Top Secret Security Clearance: Primary Miss...
 
The Works 2018 - Software Track - Home Room: Enhancements, New Products, and Q&A
The Works 2018 - Software Track - Home Room: Enhancements, New Products, and Q&AThe Works 2018 - Software Track - Home Room: Enhancements, New Products, and Q&A
The Works 2018 - Software Track - Home Room: Enhancements, New Products, and Q&A
 
The Works 2018 - Software Track - Development 101: Build Using API and Overvi...
The Works 2018 - Software Track - Development 101: Build Using API and Overvi...The Works 2018 - Software Track - Development 101: Build Using API and Overvi...
The Works 2018 - Software Track - Development 101: Build Using API and Overvi...
 
The Works 2018 - Industry Track - Intro to Technology: Tech Trends and the St...
The Works 2018 - Industry Track - Intro to Technology: Tech Trends and the St...The Works 2018 - Industry Track - Intro to Technology: Tech Trends and the St...
The Works 2018 - Industry Track - Intro to Technology: Tech Trends and the St...
 
The Works 2018 - Software Track - Pop Quiz - New Hire FAQ
The Works 2018 - Software Track - Pop Quiz - New Hire FAQThe Works 2018 - Software Track - Pop Quiz - New Hire FAQ
The Works 2018 - Software Track - Pop Quiz - New Hire FAQ
 
The Works 2018 - Software Track - Integration Partners Overview
The Works 2018 - Software Track - Integration Partners OverviewThe Works 2018 - Software Track - Integration Partners Overview
The Works 2018 - Software Track - Integration Partners Overview
 
The Works 2018 - Software Track - Cheat Sheet - Complete Study Guide to Beyond
The Works 2018 - Software Track - Cheat Sheet - Complete Study Guide to BeyondThe Works 2018 - Software Track - Cheat Sheet - Complete Study Guide to Beyond
The Works 2018 - Software Track - Cheat Sheet - Complete Study Guide to Beyond
 
The Works 2018 - Software Track - School Spirit - Branding with TempWorks Pro...
The Works 2018 - Software Track - School Spirit - Branding with TempWorks Pro...The Works 2018 - Software Track - School Spirit - Branding with TempWorks Pro...
The Works 2018 - Software Track - School Spirit - Branding with TempWorks Pro...
 
The Works 2018 - Software Track - Cramming for Finals - Year-end Study Guide
The Works 2018 - Software Track - Cramming for Finals - Year-end Study GuideThe Works 2018 - Software Track - Cramming for Finals - Year-end Study Guide
The Works 2018 - Software Track - Cramming for Finals - Year-end Study Guide
 
The Works 2018 - Industry Track - Sales 101
The Works 2018 - Industry Track - Sales 101The Works 2018 - Industry Track - Sales 101
The Works 2018 - Industry Track - Sales 101
 
The Works 2018 - Industry Track - Ineffective Onboarding Driving Away Employees
The Works 2018 - Industry Track - Ineffective Onboarding Driving Away EmployeesThe Works 2018 - Industry Track - Ineffective Onboarding Driving Away Employees
The Works 2018 - Industry Track - Ineffective Onboarding Driving Away Employees
 
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing AgenciesThe Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
 
The Works 2018 - Industry Track - Effective Screening of Hourly Skilled Appli...
The Works 2018 - Industry Track - Effective Screening of Hourly Skilled Appli...The Works 2018 - Industry Track - Effective Screening of Hourly Skilled Appli...
The Works 2018 - Industry Track - Effective Screening of Hourly Skilled Appli...
 
The Works 2018 - Industry Track - Sponsor: Clarus Solutions
The Works 2018 - Industry Track - Sponsor: Clarus SolutionsThe Works 2018 - Industry Track - Sponsor: Clarus Solutions
The Works 2018 - Industry Track - Sponsor: Clarus Solutions
 
The Works 2018 - Industry Track - Sponsor: Essential StaffCARE
The Works 2018 - Industry Track - Sponsor: Essential StaffCAREThe Works 2018 - Industry Track - Sponsor: Essential StaffCARE
The Works 2018 - Industry Track - Sponsor: Essential StaffCARE
 

The Works 2019 - Breakout Session: Security Clearance

  • 1. Security Clearance Presented by: Kevin Prow, Chief Information Officer William Dewey, Implementation Manager
  • 2. Security Roles (Enterprise) • “Sec Roles” • Users can have many security roles • Gives access to forms, reports, document types, functions, customer statuses, widgets • Prohibits access to document types, custom data fields • Denies read/write permissions on certain fields on forms
  • 3. Security Roles (Enterprise) John Doe (Service Rep) ServiceRep Priority: 10 PayClerk Priority: 100 I9 Restricted Priority: 50 Everify Priority: 30 • Allows uploading I-9s • Prohibits viewing I-9s • Can not run E-Verify • Allows viewing I-9s • Prohibits deleting I-9s • Can run E-Verify • Prohibits viewing I-9s • Prohibits uploading I-9s • Prohibits deleting I-9s • Cannot run E-Verify • Allows viewing I-9s • Allows uploading I-9s • Allows deleting I-9s • Can run E-Verify What can John Doe do with I-9 documents?
  • 4. Security Roles (Enterprise) • Challenges • Conflicting permissions • Determining why something is/isn’t available • Difficult to administer (tends to need Support assistance) • Hard to report on/audit
  • 5. Security Groups (Beyond) • Security Groups • Multiple “Types” of Groups: • Permissions • Document Types • Customer Status • Reports • Saved Searches • Custom Data • Data Exports • Message Action Types • One group, per user, per type • Single source of truth • Exposed via the TempWorks API for vendors/integrations • User-administrable
  • 6. Security Groups (Beyond) John Doe (Service Rep) Document Types Permissions Reports • Resume: Read, Write, Delete • I9: Read, Write • W4: Read, Write • Can create and edit E-Verify cases • Can assign onboarding workflows • Expired I-9s Report
  • 7. Security Groups vs. Teams • Security Groups • Control access • Each person is part of one security group, for each type of security group • Not for reporting • Teams • New concept in Beyond • Logical groups of people • Used in reporting • Used for distribution, such as tasks • Has “owners” • Can be part of multiple teams • Can own multiple teams • Doesn’t impact permissions
  • 8. Teams VP of Sales Sales Manager – West Sales Manager – East Salesperson #1 Salesperson #2 Salesperson #3 Salesperson #4
  • 9. Bridge Admins • Bridge admins are the people who can call TempWorks and make decisions like; • Make mass changes to your system • Approve custom report modifications • Make security changes • Approve billable time • What does a bridge admin need to know? • Understand how to administer security within Enterprise, Beyond & other TempWorks products. • Understand the roles your users need when using the TempWorks products.
  • 10. HAVE NO IDEA WHAT I AM DOING Step 2 Use our readily available tools to learn about security • Try searching our knowledge base • Try using our community form • Come to a super awesome security presentation at The Works • Still confused? Contact a TempWorks representative. Step 2 Understand the issue you are trying to solve • Getting details around a scenario is very important when trying to find an answer. • Think about possible solutions you may already know. Step 1 Don’t Panic
  • 12. Security Group Type - Permission • Can edit customer default worker comp codes • Can create employee EEO information • Can read employee EEO information • Can update employee EEO information • Can administrate • Can administrate security groups • Can Mass Update Assignments • Can Mass Update Rates • Can access time entry area
  • 13. Security Group Type – Document Type • The document type security group gives security groups the ability to mark specific TempWorks documents types as; • The ability to see something (Can Read) • The ability to change something (Can Write) • The ability to remove something (Can Delete)
  • 14. Security Group Type – Customer Status • Customer Status security groups are used to grant service representatives the ability to change customer status from one of the associated customer statuses. • Useful for controlling the workflow of a customer’s development.
  • 15. Security Group Type - Reports • Reports security groups are used to grant service representatives access to a set of reports. • Beyond gives you the ability to assign a “Group” of reports or you can individually select which reports you want to give access to.
  • 16. Security Group Type – Custom Data • Custom Data security groups are used to limit service representatives access to read/write access to custom data properties. • Restrict the ability to see the custom data (Deny Read) • Restrict the ability to edit the custom data (Deny Write)
  • 17. Security Group Type – Message Action Type • The Message Action category sets which message action codes a service rep can log. • For each message action type, you can select whether the service rep can view (read) or post (write) a message with that action type.
  • 18. Security Clearance – Q & A Presented by: Kevin Prow, Chief Information Officer William Dewey, Implementation Manager