4.3 User Provisioning Process Flow

This section describes the User Provisioning Process Flow.

The following table lists the various actions and associated descriptions of the user administration process flow.

Table 4-1 User Provisioning Process Flow

Action Description
Managing User Administration Create users and map users to User Groups. The Administrator can provide access, monitor, and administer users.
Adding Security Attributes Load security attributes using either Excel or SQL scripts.
Mapping Security Attributes to Organizations and Users Map security attributes to users is to determine which security attributes control the user’s access rights.

Requirements to Access ECM Application

A user gains access to the ECM application based on the authentication of a unique user ID and password.

To access the ECM application, you must fulfill the following conditions:

Table 4-2 Requirements

Applications Conditions
Case Management
  • Set of policies that associate functional roles with access to specific system functions
  • Access to one or more case types
  • One or more associated organizational affiliations that control the user's access to cases
  • Access to one or more jurisdictions
  • Access to one or more business domains
Administration Tools Set of policies that associate the admin functional role with access to specific system functions