Configure the Default Domain, Anonymous Login, and Lookup Table Security Settings
Use the General page in the Security Settings window (in CSM Administrator) to configure the following general system security settings for all clients:
- Default domain.
 - Anonymous login settings.
 - Lookup Table security.
 
Configure the default domain and anonymous login settings:
- In the CSM Administrator main window, click the Security category, and then click the Edit Security Settings task.
 - Click the General page.
 -  Provide the default domain name for your network. This is used any
        place where a domain is needed but not otherwise provided, such as
        automatically assigning credentials to Customers. 
        Tip: Click the Arrow button
 to have 
            CSM auto-populate the name. 
           - Define anonymous login options (required if you want to allow use of
        the Browser/Portal Clients): 
        
- Allow Anonymous Login: Select this check box to allow Browser applications to operate.
 - Anonymous Security
              Group: Select the Security Group that should be used by 
            Cherwell web applications before any User/Customer has logged in. 
            Cherwell web applications need to be able to read basic setup from the system
            before logging in, and this is the Security Group that will be used for such
            access. Also, for any Portal Sites that do not require login, this is the
            Security Group that will specify what Customers will be allowed to access
            before they log in. 
            Note: CSM provides an Anonymous Security Group named Anonymous Browser.
 
 - Select the 
        Enforce Lookup Table Security for Validated
          Fields check box to require that security rights be set for
        validation Fields in Lookup Objects before Users and Customers can access
        values in those Fields. For example, if you enforce security for Lookup Tables,
        Users cannot see values for validated Fields on Forms and in the Query Builder
        unless you grant them rights to these Fields in the Lookup Tables. 
        
If you select this check box, be sure to review and modify Lookup Object security rights for all security groups in your system. For more information, see Define Business Object Rights (Access to Data).
 -  
        
Click OK.
 
