Intellicus defines Kyvos Reporting provides robust security measures to ensure data access and integration according to are aligned with user roles. Functionalities available to a user depend on the Users' system privileges and access rights granted to the user.Under Security Configurations, you will find guides to secure your data in Intellicus, perform data masking, and to run Intellicus under SSL. Refer the required category to pull out the information on how to perform the respective settings to securely operate Intellicus.determine the functionalities accessible to them. This role-based access ensures that users interact with data and features strictly within the boundaries of their granted permissions.
Security Configurations
Data Security
Secure data access by defining role-based permissions.
Implement granular data access control to restrict the visibility of sensitive data.
Data Masking
Mask specific fields or data columns based on user roles.
Prevent unauthorized users from viewing sensitive data while maintaining data utility for analytics.
SSL for Secure Communication
Configure Kyvos Reporting to operate under SSL for secure data transmission.
This protects data integrity and confidentiality by encrypting communication between clients and servers.
Where to Access These Configurations
Refer the respective sections below.
Child pages (Children Display) | ||
---|---|---|
|