Specifications

ID Works Basic Version 5 Administrator’s Guide
9
System Security
An identification program is not
secure if the computer system that
gathers the data and produces the
ID cards is not secure. This chapter
is written for the ID Works System
Administrator, the person responsible for ensuring the security of an
organization’s ID Works systems. It assumes a basic understanding
of network security concepts and Administrator privileges on the local
network.
ID Works identification software offers two levels of security features:
those provided as part of the ID Works software and those available
through the Windows operating system.
ID Works Security Features
Security features built into the ID Works software include:
User name and password required for access to all ID Works
applications.
Production workstations can be configured to log users out after a
specified period of inactivity.
Users can change their passwords quickly and easily,
encouraging frequent changes.
System Administrators have full flexibility in granting or restricting
access to ID Works applications and features within applications.
Audit log tracks activity on each computer on which ID Works
software is installed.
System Administrator/project designer can specify additional
actions to track in audit log.
Project designer can further restrict database access for all users
of an ID Works project. (See “Controlling Database Activities” on
page 89.)