Configure the Default Domain, Anonymous Login, and Lookup Table Security Settings

Use the General page in the Security Settings window (in CSM Administrator) to configure the following general system security settings for all clients:

  • Default domain.
  • Anonymous login settings.
  • Lookup Table security.

Configure the default domain and anonymous login settings:

  1. In the CSM Administrator main window, click the Security category, and then click the Edit Security Settings task.
  2. Click the General page.
  3. Provide the default domain name for your network. This is used any place where a domain is needed but not otherwise provided, such as automatically assigning credentials to Customers.
    Tip: Click the Arrow button Arrow Left Green to have CSM auto-populate the name.
  4. Define anonymous login options (required if you want to allow use of the Browser/Portal Clients):
    1. Allow Anonymous Login: Select this check box to allow Browser applications to operate.
    2. Anonymous Security Group: Select the Security Group that should be used by Cherwell web applications before any User/Customer has logged in. Cherwell web applications need to be able to read basic setup from the system before logging in, and this is the Security Group that will be used for such access. Also, for any Portal Sites that do not require login, this is the Security Group that will specify what Customers will be allowed to access before they log in.
      Note: CSM provides an Anonymous Security Group named Anonymous Browser.
  5. Select the Enforce Lookup Table Security for Validated Fields check box to require that security rights be set for validation Fields in Lookup Objects before Users and Customers can access values in those Fields. For example, if you enforce security for Lookup Tables, Users cannot see values for validated Fields on Forms and in the Query Builder unless you grant them rights to these Fields in the Lookup Tables.

    If you select this check box, be sure to review and modify Lookup Object security rights for all security groups in your system. For more information, see Define Business Object Rights (Access to Data).

  6. Click OK.

© Copyright 2018 Cherwell Software, LLC. All rights reserved.