Security
Access Control
Access to the Therefore™ system and documents is totally controlled by using three different levels of security.
1. The main access to the solution is via Microsoft® Windows Active Directory system. This controls the access that users have to their documents and storage areas without the need of a second user name and password. It also makes the IT task easier to manage because rights can be assigned to either the individual or groups of users.
2. Therefore™ security features allow the administrator to remove options from specific groups of users. This is typically used to stop users annotating or printing documents.
3. The Rights server is a built in option that allows the use of an external table. The main use of this is to allow varying levels of access within a group. This system makes use of the active directory table first and then allows an administrator to give access to a specific file or document that wouldn’t normally be allowed.
Digital Signatures
A document’s content and origin can only be guaranteed by forgery-secure storage. A digital signature, contained on every document in the Therefore™ server, secures the authenticity of all information. During the retrieval of every document, the Therefore™ server verifies the signature to ensure the user is receiving valid information. |