Horizon’s security features are powerful and flexible. They give you almost unlimited possibilities for controlling what users can access and change. While there is some work involved in setting up security initially, the process for making changes is relatively simple and easy to administer. This process is especially helpful for libraries that have a large number of users who require various levels of access.
Be aware that the security settings you define in Horizon are bypassed when users access the Horizon database using third-party products, such as SQL Advantage or Crystal Reports. You define database access in your database server software, independent of the security settings you define in Horizon. Restrictions at the database level that are in conflict with rights you grant in Horizon will override the rights in Horizon.
The sections that follow give you the information you need to set up and maintain your security settings:
• | About Security introduces the elements of Horizon security and explains how they work together to grant or restrict rights. If you are new to Horizon security, read this section before you set up or update your security settings. |
• | Setting Up Security walks you through each task you must complete to set up Horizon security. This section is geared to system administrators who are setting up security for the first time, but it is also applicable if you are making changes to your initial set up. |
• | Updating Security provides a quick reference for all the security-related tasks you may need to perform after security is set up initially. |
• | Security Details provides additional information about Horizon security. It includes a list of all the secured processes in Horizon. |
© 1998-2017 Sirsi Corporation