2286 Security Admin UG
2286 Security Admin UG
2286 Security Admin UG
User Guide
The information in this publication is provided for reference only. All information contained
in this publication is believed to be correct and complete. Thermo Fisher Scientific shall not
be liable for errors contained herein nor for incidental or consequential damages in connection
with the furnishing, performance or use of this material. All product specifications, as well as
the information contained in this publication, are subject to change without notice.
This publication may contain or reference information and products protected by copyrights
or patents and does not convey any license under our patent rights, nor the rights of others.
We do not assume any liability arising out of any infringements of patents or other rights of
third parties.
We make no warranty of any kind with regard to this material, including but not limited to
the implied warranties of merchantability and fitness for a particular purpose. Customers are
ultimately responsible for validation of their systems.
2003-2011 Thermo Fisher Scientific Inc. All rights reserved. No part of this publication
may be stored in a retrieval system, transmitted, or reproduced in any way, including but not
limited to photocopy, photograph, magnetic or other record, without our prior written
permission.
For Technical Support, please contact:
Thermo Fisher Scientific
5225 Verona Road
Madison, WI 53711-4495 U.S.A.
Telephone: 1 800 532 4752
E-mail: us.techsupport.analyze@thermofisher.com
World Wide Web: http://www.thermo.com/spectroscopy
For International Support, please contact:
Thermo Fisher Scientific
Telephone: +1 608 273 5017
E-mail: support.madison@thermofisher.com
World Wide Web: http://www.thermo.com/spectroscopy
Windows is either a trademark or a registered trademark of Microsoft Corporation in the
United States and/or other countries. All other trademarks are the property of Thermo Fisher
Scientific Inc. and its subsidiaries.
269-228601, Rev A
Contents
Introduction............................................................................................................ 1
Manual conventions................................................................................ 2
Overview of Windows Administration ............................................................. 3
Basic network concepts ...........................................................................3
Network terms ........................................................................................ 3
Servers and clients ............................................................................. 3
Domains and domain controllers ...................................................... 3
Trust relationships ............................................................................ 4
Rights .......................................................................................... 4
Permissions .......................................................................................5
Users and groups...............................................................................5
Supported configurations ........................................................................6
The role of the network administrator ....................................................9
The role of the system administrator .....................................................10
Setting up Windows users .....................................................................11
Windows security features.....................................................................12
Logon security features..........................................................................12
Locking a workstation ...........................................................................13
Event logging ........................................................................................ 13
Local and global user groups and rights .................................................20
User profiles ..........................................................................................20
Other security features ..........................................................................21
Complying with 21 CFR Part 11 ..........................................................21
Setting Up Windows Administration .............................................................. 23
Setting Service Accounts ................................................................................. 26
Installing the Software ...................................................................................... 28
Setting Up Client Application Accounts ........................................................ 32
Using Security Administration ......................................................................... 37
About the display .................................................................................. 38
Displaying the toolbar........................................................................... 38
Displaying the status bar ....................................................................... 39
Using the keyboard to select items in the navigation pane..................... 39
Thermo Scientific
ii
Thermo Scientific
Introduction
Introduction
This manual explains how to use Thermo Scientific Security
Administration software. You can use the software to set and enforce
security policies for one or more Thermo Scientific client applications that
have been programmed to work with the software. Typically a client
application comes with a manual explaining how to set its specific policies.
Security Administration comprises two separate applications that work in
conjunction with your operating system to provide a secure environment
that supports the requirements of 21 CFR Part 11.
Introduction
Manual conventions
Note
Important
Thermo Scientific
Overview of Windows
Administration
Setting up Windows administration is necessary before you can install and
use Security Administration. This chapter provides an overview of network
concepts and Windows security features and will prepare you for setting up
the Windows groups and user accounts for Security Administration and
your client applications.
Basic
network concepts
Network terms
The definitions in the next sections explain some commonly used network
terms.
Thermo Scientific
Rights
Thermo Scientific
Note
Thermo Scientific
A global group consists of several user accounts from one domain that
are grouped together under one group account name. A global group
can contain user accounts from only one domainthe domain in
which the global group was created. Global indicates that the group
can be granted rights and permissions to use resources in multiple
(global) domains. A global group can contain only user accounts and
can be created only on a domain, not on a workstation or member
server.
Supported configurations
A local group consists of user accounts and global groups from one or
more domains, grouped together under one account name. Users and
global groups from outside the local domain can be added to the local
group only if they belong to a trusted domain. Local indicates that
the group can be granted rights and permissions to use resources in
only one (local) domain. A local group can contain users and global
groups but no other local groups.
You can use Security Administration to set and enforce security policies in
four types of network and other configurations:
In the single domain model, Security Administration and Thermo
Security Service are installed together on any machine that is a member of
the domain. The client application is installed on multiple workstations
that are members of the domain.
Thermo Scientific
Thermo Scientific
Peer-to-peer workgroup
Stand-alone configuration
Thermo Scientific
Users must not be able to change the date and time on the local system
clock.
Thermo Scientific
Put the names of the users of the software onto the system, if this has
not already been done. Users must be either on the domain in which
Security Administration and Thermo Security Service are running, or
on a domain with which a mutual trust relationship exists.
Set up the lists of users and groups permitted to perform each of the
protected functions of the client application.
policies that are not required. The system administrator may also add
new policy groups and disable policies for groups of users.
10
Thermo Scientific
After the initial setup the system administrator will need to perform the
following maintenance tasks:
Make any changes that are needed to the list of signature meanings.
The system administrator will not be able to:
Setting up
Windows users
In order for users to start a client application, they must have access to the
workstation and must have been granted access to the client application by
Security Administration. This means that each user must be assigned a
Windows user name and password to log on to the system. The Windows
local administrator must add each user to the list of users who can access
the workstation. The user name will be the users logon name when
accessing the workstation.
Through User Accounts the administrator can add each users network user
name to access the workstation or can create new users specifically for that
workstation. The administrator can also specify the rights and privileges
each user has to the workstation.
Windows passwords are required for each user of the client application to
start and use the application. Windows passwords are required for digitally
signing files and also for providing data security within the client
application.
The administrator should take into consideration the Windows
Workstation security features described in the next section when deciding
the rights and privileges that should be assigned to users.
Thermo Scientific
11
Windows
security features
Note
Local Security Policy has many features to make passwords and logging on
to the workstation more secure. Refer to your Windows documentation
for information about how to locate the Local Security Policy feature in
your version of Windows software.
The administrator can assign user passwords and prevent users from
12
Thermo Scientific
The administrator can specify that user accounts be locked out after a
specified number of failed attempts to log on. The account can remain
disabled for a specified period of time or until the administrator resets
the account. These settings can be changed for the workstation by
using Local Security Policy.
Note
Locking a workstation
Event logging
Thermo Scientific
13
The name of the client application that was being used when the event
occurred.
The type of event that occurred.
The user name of the person who was logged in when the event
occurred.
The identification of the computer that was being used when the event
occurred.
14
Thermo Scientific
Here is an example:
The first three, described below, are standard Windows logs. The
administrator can specify the events to log by using the Windows Local
Security Policy. Settings for the logs, such as the maximum size of the
log and when to overwrite events, can be modified; choose Help from
the Action menu for more information.
Thermo Scientific
15
16
Thermo Scientific
Events that are logged for the above services include the following
(grouped by source):
Admin
Access control item changed
Policy group added
Policy group changed
Policy group deleted
Policy item changed
Signature reason added
Signature reason changed
Signature reason deleted
Thermo Security Service
Service started
Security database opened
Service could not start
Service stopped
Thermo Log Service
File created
File modified
File deleted
File renamed
Thermo client application(s)
Log on
Log off
Log on failed
File created
File signed
File signing failed
File modified
File deleted
Fail to verify files signature (file tampering)
Note
Thermo Scientific
Other specific events may be included for the Thermo client applications
you use.
17
You can sort the events according to date, category, user and so on by
clicking the column headings.
18
Thermo Scientific
If the event was the signing of a file, the signature meaning appears in
the dialog box.
To see information about the preceding event in the list, click the up
arrow button. To see information about the next event in the list, click
the down arrow button.
You can export the list of events by choosing Export List from the
Action menu. In the Save As dialog box that appears, specify where to
save the list and the type of file to use. Then choose Save to save the
list. You can use a word processing program or other program to open
the saved file and print the list or work with it in other ways.
Thermo Scientific
19
The administrator can set up local or global user groups to manage users
more efficiently. A local group is a group of users associated with a
particular workstation. A global group is a group of users associated with a
network domain, which can include more than one workstation. Local
groups can contain global groups from a network domain. Rights and
permissions can be assigned to a local group, and users or global groups can
be added and deleted from the local group.
Local and global groups can be set up in User Manager by using New
Group in the Action menu in the Local Users And Groups in Computer
Management. Rights and privileges can then be assigned or unassigned to
those groups by using the Windows Local Security Policy. Some of the
rights that can be assigned or removed include:
The right to access the workstation from a network. This right must be
granted to every user of the client application.
20
Note
Restricting the right to change the system date and time is an important
security feature. If this right is removed from a user group, the users in that
group cannot collect data under a falsified date and time.
User profiles
The administrator can assign users mandatory profiles that control the
users desktop settings and prohibit users from permanently changing their
desktop settings. The administrator can assign profiles by using Local Users
And Groups in Computer Management in Windows software.
Thermo Scientific
Complying
with 21 CFR Part 11
Review the group membership of each user account as well as the rights
or privileges associated with each account and group.
behavior, etc.) to assess the suitability of the policy for compliance with
21 CFR Part 11 and for conformity with your own organizations
standards and procedures.
Review the access control settings for those locations where users will
be permitted to save, modify or delete files.
Thermo Scientific
21
application, and the access rights for these users is managed centrally in
a single security database, there must be a mutual (bidirectional) trust
relationship between the domain where Security Administration is
installed and each of the domains that have user accounts and groups
managed by Security Administration.
22
Thermo Scientific
Note
Thermo Scientific
23
Note
Users in the Scientists group will be able to use all the features in
the client applications but will not be able to use Security
Administration.
You can create the groups you need and then add the appropriate users
to them. We will go through the creation of a group later in this
procedure.
To see which users and groups exist, click the Users folder. The users
and groups are listed in the Name column in the right pane. Here is an
example:
24
Thermo Scientific
After you have finished updating the users and user groups, log off the
system.
You can now install Security Administration and your client
application as explained in the Installing the Software chapter. After
the software is installed, follow the instructions in the Setting Up
Client Application Accounts chapter to set up the user accounts for
the application.
Thermo Scientific
25
To reduce the access privileges of the services so that they present less
of a security risk, as recommended by Microsoft Corporation.
26
Thermo Scientific
2. Follow these steps to set up Thermo File Service and Thermo Log
Service.
a. Click the Log On tab.
b. Select This Account.
c. Enter information for the account you want to use.
d. Choose OK.
e. Repeat steps a through d for Thermo Log Service.
Thermo Scientific
27
28
Thermo Scientific
4. Install Thermo Log Service on file servers that host network drives
used by your application.
This service makes it possible to keep a record of when files are created,
modified, renamed or deletedeven when the client application is not
running.
To install this service, load the Security Administration installation
media into the computer you are using as a file server. If the
installation of the Security Administration program starts
automatically, cancel that installation. Use Explorer to browse to the
AuditChangesToFileSystem.msi file, located on the root of the media,
and double-click the file. This will launch the Thermo Log Service
installer.
As part of the installation process, a dialog box will let you specify
where the Security Administration Server program is installed. You can
manually type the name of the computer running the Security Server
or use the search feature to locate the server. When the server is located
and the installer finishes, the Thermo Log Service will watch for
changes on the file server and write event records to the event log
located on the computer running the Security Administration Server.
This coalesces all change event records in one event log.
Thermo Scientific
29
30
The first time you log onto a computer with a client application whose
security is controlled by Security Administration, you are asked to specify
the server where Security Administration (which includes Thermo Security
Service) is installed. Here is an example:
Thermo Scientific
If you have Windows Firewall turned on, it may block the ability for the
Search button to find the server name. Also, if your network is large it may
take a long time to find the server name.
Follow the instructions in your Windows documentation to locate the full
computer name in your version of Windows software. This is the name to
enter into the server name text box on the Locate Security Server dialog.
Once the desired location is shown in the Server Name text box, you can
choose Test Connection to verify that communication with Thermo
Security Service is established. Choose OK when you are finished.
After the computer has restarted, you can log on as the administrator
and start Security Administration by double-clicking the Security
Administration shortcut on the Windows desktop.
For every client application that will be controlled by Security
Administration, you need to use Add Application in the File menu to
add the applications .XML file to the security database. This is
explained in the procedure in the next chapter, which also explains
how to set up your client application accounts. If you are going to
perform software installation qualification (IQ), follow the software IQ
instructions in the documentation that came with the client
application before using the next chapter.
Thermo Scientific
31
3. If you have not already added the client application, choose Add
Application from the File menu. If you have already added the
application, go to step 5.
The Add Application dialog box appears.
32
Thermo Scientific
Note
The example icons and other security items shown in this manual may be
different from those for your client application. See the manual that came
with your application for specific instructions.
6. Click the plus sign to the left of the Access Control folder.
The Administer Security Database icon appears.
Thermo Scientific
33
The check mark indicates that members of the group can use the
Security Administration software.
10. Click the plus sign to the left of the client application icon, and
then use the displayed features to set the security policies for the
application.
Here is an example showing the three kinds of security policies that
you can set:
Access Control lets you set the rights of users to use protected functions
in the application. By default, every user has access to every feature in
the client application. You must restrict access as needed to achieve the
desired control over which users can use specific features. See
Controlling access to client application features in the Using
Security Administration chapter for general instructions. Then see the
manual that came with the client application for more specific
instructions for controlling access to its functions.
34
Thermo Scientific
System Policies lets you set policies covering such things as preventing
the overwriting of files and requiring electronic signatures. See Setting
system policies for the client application in the Using Security
Administration chapter for general instructions. Then see the manual
that came with the client application for more specific instructions for
setting its system policies.
Signature Meanings lets you specify the meanings that will be available
for electronic signatures supplied by users of the application. The
available signature meanings vary depending on the client application.
See Assigning signature meanings in the Using Security
Administration chapter for general instructions. Then see the manual
that came with the client application for more specific instructions for
specifying which signature meanings will be available.
Thermo Scientific
35
Note
The first time you log onto a computer with a client application whose
security is controlled by Security Administration, you are asked to specify
the server where Thermo Security Service is installed. Here is an example:
If you have Windows Firewall turned on, it may block the ability for the
Search button to find the server name. Also, if your network is large it may
take a long time to find the server name.
Follow the instructions in your Windows documentation to locate the full
computer name in your version of Windows software. This is the name to
enter into the server name text box on the Locate Security Server dialog.
Once the desired location is shown in the Server Name text box, you can
choose Test Connection to verify that communication with Thermo
Security Service is established. Choose OK when you are finished.
36
Thermo Scientific
Note
If you have just installed a new version of a client application that has new
features controlled by Security Administration, use Add Application in the
File menu to add the new versions .XML file. This merges the new features
into the existing settings you have specified for the application. Typically
the .XML file is in the root directory of the client application installation
media. See Adding a client application for more information.
The next section explains the features contained in the Security
Administration window.
Thermo Scientific
37
The navigation pane has a tree structure that is initially displayed with its
sub-levels collapsed. Clicking the plus sign to the left of an icon or folder
in the tree expands it to display more icons or folders in the tree. Clicking
some icons in the tree displays features in the right pane, allowing you to
set security policies for Security Administration or a client application.
Use Toolbar in the View menu to display a toolbar containing buttons for
choosing some commonly used menu commands. See the illustration in
the preceding section for the location of the toolbar.
You may find it convenient to choose a command by clicking its toolbar
button instead of choosing the command from a menu. To see the name of
the command associated with a button or a description of its function,
point to the button and wait for the name to appear.
38
Thermo Scientific
Use Status Bar in the View menu to display a status bar showing
information such as the purpose of the currently highlighted menu
command. Follow these instructions:
Choose Status Bar from the View menu. The status bar appears below the
navigation pane, and a check mark appears to the left of the command
name. To remove the status bar from the display, choose Status Bar from
the View menu when the check mark is present.
Thermo Scientific
39
Displaying
Help information
Note
Help for
client applications
The Help system that appears depends on which program contains the
selected feature.
Note
40
Thermo Scientific
Controlling
access to Security
Administration
Setting up security for your system must include controlling who can run
Security Administration. When you open the Admin icon in the
navigation pane, the Access Control folder appears. When you open it, the
Administer Security Database icon appears:
When you click the Administer Security Database icon, a list of access
rights and other features appear in the right pane. Here is an example:
You can use features in the right pane to specify which users can start
Security Administration.
If the computer is connected to one or more networks, selecting a network
or the local computer from the List Names From drop-down list box lists
the users and groups on that network or computer in the Names box. This
lets you control access to Security Administration for the users and groups
on the networks and computer. If the computer is not connected to a
network, the List Names From drop-down list box is not available, and the
users and groups on the computer are listed in the Names box.
Thermo Scientific
41
The users and groups on the selected network or computer for whom
access to the software has been specified appear in alphabetical order in the
Access Rights box. If a check mark appears to the left of a name, that user
or group can start the software. If no check mark appears, that user or
group is denied the right to start the software. If a user without access
attempts to start the software, the following message appears:
If you click a check box to remove its check mark, denying a user or group
access to start the software, this denial takes priority over any other settings
that grant the user or group access. To prevent confusion, you should
generally deny access only for individual users and not for groups.
Typically, access is granted to a group and then denied to particular
members of the group.
Important
42
Thermo Scientific
This removes that users or groups right to start the software. (There is an
exception to this: If a removed user is a member of a group that has the
right to start the software, the user will have that right.)
To fully control access to Security Administration, be sure to specify access
as explained above for the all users and groups on the local computer and
all the networks available in the List Names From drop-down list box.
When you are finished, save your settings in the security database. See
Saving your security policy settings for details.
Adding a
client application
Use Add Application in the File menu to add a client application to the
navigation pane. You can then set security policies for the application.
If you have just installed a new version of a client application that has new
features controlled by Security Administration, be sure to use Add
Application to add the new versions .XML file. Typically the file is in the
root directory of the client application installation CD. This merges the
new features into the security database and preserves all of your existing
settings.
Follow these steps to add a client application:
1. Choose Add Application from the File menu.
The Open dialog box appears.
Thermo Scientific
43
2. Locate and select the client application file you want to open.
Typically the application file is in the root of the client application
installation media.
Note
3. Choose Open.
The application appears as an icon in the tree in the navigation pane.
See Setting security policies for client applications for instructions for
setting security policies for the application.
Important
Removing a
client application
After you add a client application, restart the computer so that Thermo Log
Service will be able to monitor the new file extensions that were added.
Use Remove Application in the File menu to remove a client application
from the navigation pane.
Follow these steps to remove a client application:
1. Choose Remove Application from the File menu.
A message appears. Here is an example:
44
Thermo Scientific
Setting security
policies for
client applications
When you open the icon for a client application, three kinds of security
functions for the application become available in the navigation pane:
Using Access Control, you can set the rights of individual users or groups
of users to use the protected functions of the client application. See
Controlling access to client application features for more information.
With System Policies you can set policies covering such things as
preventing the overwriting of files and requiring electronic signatures. See
Setting system policies for the client application for details.
The Signature Meanings features let you specify the meanings that will be
available for electronic signatures supplied by users of the system. See
Assigning signature meanings for more information.
After you use these features to set security policies for the client
applications, you can save your settings in the security database and print
the database. See Saving your security policy settings and Printing the
database for details.
Controlling
access to client
application features
Thermo Scientific
Use Access Control to set the rights of individual users or groups of users to
use the protected functions of the client application. A feature in the
application will be available only if the logged-in user has the right to use
it.
45
When you open the Access Control folder for the client application by
clicking its plus sign, a tree of folders and other items appears. Here is an
example:
46
Thermo Scientific
You can click a function to display features for controlling access to that
function. Here is an example:
The features provided depend on the client application you are setting up.
See the documentation that came with your client application for more
specific information about controlling access to its protected functions.
If the computer is connected to one or more networks, selecting a network
or the local computer from the List Names From drop-down list box lists
the users and groups on that network or computer in the Names box. This
lets you specify access to the function for the users and groups on the
networks and computer. If the computer is not connected to a network,
the List Names From drop-down list box is not available, and the users and
groups on the computer are listed in the Names box.
The users and groups on the selected network or computer for whom
access to the function has been specified appear in alphabetical order in the
Access Rights box. If a check mark appears to the left of a name, that user
or group can use the function. If no check mark appears, that user or group
cannot use the function.
Thermo Scientific
47
If you click a check box to remove its check mark, denying a user or group
access to the function, this denial takes priority over any other settings that
grant the user or group access. To prevent confusion, you should generally
deny access only for individual users and not for groups. Typically, access is
granted to a group and then denied to particular members of the group.
To specify access control for a user or group not listed in the Access Rights
box, select it in the Names box or type it in the text box below the list, and
then choose Add.
This removes that users or groups right to use the function. (There is an
exception to this: If a removed user is a member of a group that has the
right to use the function, the user will have that right.)
Important
48
Thermo Scientific
Note
You can use Add To All Access Control Items in the File menu to quickly
grant or deny a user access to all the features of an application whose access
is controlled by Security Administration. Similarly, you can use Remove
From All Access Control Items in the File menu to remove the grant or
deny designation for a user from all the features of an application whose
access is controlled by Security Administration. See the next two sections for
details.
By specifying access control for logical combinations of groups and
individual users, you can quickly specify that some, but not all, of the
members of a group have access to a command. Consider this example:
Currently only the members of the Administrators group have access to a
command:
You want all the members of the Technicians group except Pat Jones
(whose user name is pjones) to have access to the command as well. This
can be accomplished in two simple steps.
Thermo Scientific
49
First, use the Add button to add Technicians and pjones to the Access
Rights box. Initially, check marks appear (by default) to the left of the two
added names in the Access Rights box:
These initial settings give all members of the Technicians group (and the
Administrators group) access to the command.
Next, to deny Pat Jones access, click the check box to the left of pjones to
remove the check mark:
The access rights are now set as desired and ready to be saved.
To fully control access to a function, be sure to specify access control as
explained above for the all users and groups on the local computer and all
the networks available in the List Names From drop-down list box.
When you are finished, save your settings in the security database. See
Saving your security policy settings for details.
50
Thermo Scientific
Granting or denying
users access to all
protected functions
of an application
Use Add To All Access Control Items in the File menu to quickly grant or
deny a user or user group access to all of the protected functions of Security
Administration or a client application. This has the same effect as granting
or denying the user or user group access to all of the functions individually.
Follow these steps:
1. Select the application for which you want to grant or deny access.
You can select Security Administration or a client application. Click
the appropriate icon in the navigation pane to select an application.
2. Choose Add To All Access Control Items from the File menu.
A dialog box lists the available users and groups. Here is an example:
3. Specify the user or user group to whom you want to grant or deny
access.
To do this, select an item in the list box or type a name in the text box.
4. Specify whether to grant or deny access by selecting Grant Access or
Deny Access.
5. Choose OK.
Thermo Scientific
51
Removing a users
access designation for
all protected functions of
an application
Use Remove From All Access Control Items in the File menu to quickly
remove a users or user groups grant or deny designation for all of the
protected functions of Security Administration or a client application. This
has the same effect as removing the designation for all of the functions
individually. Follow these steps:
1. Select the application for which you want to remove the users
access designation.
You can select Security Administration or a client application. Click
the appropriate icon in the navigation pane to select an application.
2. Choose Remove From All Access Control Items from the File
menu.
A dialog box lists the available users and groups. Here is an example:
3. Specify the user or user group to whom you want to deny access.
To do this, select an item in the list box or type a name in the text box.
4. Choose OK.
52
Thermo Scientific
Use System Policies to set policies covering such things as preventing the
overwriting of files and requiring electronic signatures. Normally all of the
system policies for a client application are selected to provide the most
restrictive and controlled environment.
When you open the System Policies item in the navigation pane by
clicking its plus sign, a tree of icons appears. Each icon in the tree
represents a system policy or, if there is a plus sign to the left of the icon, a
group of related policies; click the plus sign to reveal the individual
policies. Here is an example of client application system policies:
The available polices depend on the client application you are setting up.
If a check box appears to the left of a policy, you can specify whether it is
selected or not selected for different policy groups. A policy group is a
group of users for whom you can set system policies. You can create policy
groups and add users to them; this is explained later in the Creating a
policy group, deleting a group or editing a groups name and Adding
users or removing users from a policy group sections.
Thermo Scientific
53
One policy group, Global Polices For Everyone, is present for every system
policy. Its purpose is to provide policy settings for users whom you have
not yet assigned to a group. All users are automatically members of this
group. You cannot delete the group, change its name, delete users from it
or add users to it. If a user is a member of another group, that groups policy
settings for the user are used instead of the settings of the Global Policies For
Everyone group.
If no check box appears to the left of a policy in the navigation pane (see
Default Configuration in the illustration), it is not the type of policy that
can be selected or not selected for different policy groups. Instead, it lets
you specify a system attribute, such as a default configuration or default
directory, for policy groups. An example of this is explained later in this
section.
You can click a policy to display features for specifying that policy. Here is
an example:
54
Thermo Scientific
The features provided depend on the type of policy and the client
application you are setting up. See the documentation that came with your
client application for more specific instructions for setting its system
policies.
When you select a policy group in the Policy Groups box, that groups
settings for the selectable policies appear in the tree in the navigation pane
(a check mark appears or does not appear in the check box to the left of
each policy name). This lets you see all of the groups selectable settings at
a glance. In addition, the members of the selected group are listed in
alphabetical order in the Policy Group Members box.
Once you have selected a policy group, you can click a policy in the
navigation pane in order to set that policy for the group. You do this by
using either a check box that appears in the Description box or other
special features that are explained in the manual that came with the client
application. Here is an example showing the check box for a selectable
policy:
To change the setting, click the check box. A check mark in the check box
means the policy will be in effect for the group after you save the security
database.
Policies that let you specify a system attribute, such as a default
configuration or default directory, include whatever special features are
needed for setting the policy. These features are explained in the manual
that came with the client application. In the OMNIC example below, the
Default Configuration policy is used to specify a default configuration file
to be used for different policy groups who run a client application. To set
this policy, you would type the pathname of the desired configuration in
the Default Configuration text box or use the Browse button to locate and
select a path.
Thermo Scientific
55
When you are finished setting the system policies, save your settings in the
security database. See Saving your security policy settings for details.
Creating a policy group, deleting
a group or editing a groups name
You can create a new policy group, delete a policy group or edit a policy
groups name.
To create a new policy group, click the Add button to the right of the
Policy Groups box.
Type a description for the group (for example, Technicians) and choose
OK. The new group appears in the Policy Groups box, with a name that
includes the description you entered; for example, Policies for
Technicians. You can then add users to the group by using the Add
button to the right of the Access Rights box, as explained later in this
section.
To delete a policy group (other than the Global Policies For Everyone
Group), select the group in the Policy Groups box and click the Delete
button.
56
Thermo Scientific
To edit the name of a policy group (other than the Global Policies For
Everyone Group), select the group in the Policy Groups box and click the
Edit button.
The Edit Policy Group Name dialog box appears. Here is an example:
Type a new description for the group and choose OK. The edited group
name appears in the Policy Groups box.
Adding users or removing
users from a policy group
You can add users to the selected policy group or remove them from the
group.
To add a user to the policy group, select the desired user in the Names box
or type the name in the text box below the list, and then choose Add.
Thermo Scientific
57
Assigning
signature meanings
Use Signature Meanings to specify the meanings that will be available for
electronic signatures supplied by users of the client application. Each client
application has its own default list of available signature meanings. You can
edit or delete these meanings and add new meanings. You can also specify
which users or groups can use particular meanings.
Note
Some client applications include a system policy that specifies whether users
can enter custom signature meanings. See the documentation that came
with your client application for more information.
To see the current signature meaning assignments, click the Signature
Meanings icon for the client application. If the Signature Meanings icon is
not visible, click the plus sign to the left of the applications icon in the
tree. Here is an example showing the Signature Meanings icons:
58
Thermo Scientific
If you make changes to the list of signature meanings and later want to
restore the default list, see the manual that came with your client
application and edit the list to match the manual illustration that shows the
default list.
When you select a signature meaning in the list by clicking it, the Access
Rights box lists the user groups whose permission to select that signature
meaning has been specified. If a check mark appears to the left of a listed
user group, those users can select that signature meaning when signing a
file. If no check mark appears, users in that group cannot select that
Thermo Scientific
59
signature meaning. If a user group is not listed in the Access Rights box,
those users also cannot select that signature meaning unless they have been
granted permission individually to select that meaning. (Some exceptions
to these rules are explained in the next section.)
The next sections explain how to change the permission specifications for
the selected signature meaning and change the list of available signature
meanings. When you are finished, save your settings in the security
database. See Saving your security policy settings for details.
Changing signature
meaning assignments
60
Thermo Scientific
This removes that users or groups permission for the signature meaning,
just as if you have removed the check mark to the left of the name of the
user or group. (There is an exception to this: If a removed user is a
member of a group that has permission for the meaning, the user will have
permission.)
To fully specify permissions for a signature meaning, be sure to specify
permissions as explained above for the all users and groups on the local
computer and all the networks available in the List Names From dropdown list box.
When you are finished, save your settings in the security database. See
Saving your security policy settings for details.
Changing the
available signature meanings
Thermo Scientific
61
Type the desired text in the text box and then choose OK. The text you
entered appears in the list of available signature meanings. You can then
use the instructions in the preceding section to specify which user groups
can select this signature meaning when signing a file.
To delete a signature meaning from the list of available meanings, select
the meaning by clicking it and then choose Delete.
The meaning will no longer be available to users when they sign files.
To edit a signature meaning in the list of available meanings, select the
meaning by clicking it and then choose Edit.
Edit the text in the text box as desired and then choose OK. The edited
text appears in the list of available signature meanings.
62
Thermo Scientific
Saving
your security
policy settings
Use Save Settings in the File menu to save the security policy settings you
have specified for the client applications. Your new settings must be saved
in the security database in order for them to be in effect when users start
the client applications.
After you save your settings, you can see them in the database and also
print the database. See Previewing the security database and Printing
the database for more information.
Note
If you have made changes to any security policy settings and then exit
Security Administration without first saving your settings, you will be
prompted to save the settings. See Exiting Security Administration for
details.
Follow these instructions to save your security policy settings:
Choose Save Settings from the File menu.
Your security policy settings are saved in the security database.
Note
If you have inadvertently removed your own access rights to run Security
Administration, a message informs you. Close the message, use the
Administer Security Database item in the Access Control folder under the
Admin icon to restore your access rights (see Controlling access to
Security Administration) and then save the database. Only another user
with rights to use Security Administration can remove your rights to run
the program. This prevents a sole administrator from being locked out of
the program accidentally.
If a client application was running while you used Security Administration
to change its security policy settings, the new settings will not take effect
until the application is exited and restarted.
Note
Thermo Scientific
Every change you make to the security database is logged in the system
event log when you save your settings.
63
Printing the
security database
Previewing the
security database
Note
The File menu contains three commands that let you preview the security
database before printing it, set options that affect printing, and print the
contents of the database. Printing the database lets you keep a hard-copy
record of your most recently saved settings. The next sections explain how
to use the commands.
Use Print Preview in the File menu to view the contents of the security
database before printing it.
Only settings that you have saved will appear in the database. See Saving
your security policy settings for information about saving your security
policy settings.
Follow these steps to preview the security database:
1. Choose Print Preview from the File menu.
A window appears displaying the first page or first two pages of the
security database. (The number of pages displayed depends on whether
one or two pages were displayed when you last finished using Print
Preview.)
Note
The text in the security database may not display correctly if no printer
driver is installed on the computer. If this happens, install an appropriate
printer driver.
While you are viewing the database, you can switch between displaying
one page at a time and two pages by using the Two Page and One Page
buttons.
At the top of the first page is a list showing who last saved security
policy settings, the network domain to which that person belongs, and
the date and time the settings were saved. Following the list are the
current security policy settings.
64
Thermo Scientific
You can enlarge the text on the page to make it easier to read by
clicking the Zoom In button. If needed, a scroll bar appears at the right
side of the window, allowing you to scroll text into view. Only one
page is displayed at a time when you zoom in. To zoom out in order to
see more of a page, click the Zoom Out button. The buttons are
available only when the limit of the size adjustment has not been
reached.
You can also click a page to zoom in. When the page is enlarged as
much as possible, clicking it again zooms the view all the way out.
To see the next page (or pages), click the Next Page button. To see the
previous page (or pages), click the Prev Page button.
If you want to print the database, click the Print button. Set the print
options in the dialog box that appears and then choose OK. If you
need help, right-click a feature or see your Windows documentation.
Since this also closes the preview window, the procedure is finished.
Note
You can also print the database using Print in the File menu. See Printing
the security database for details.
2. When you are finished viewing the database, click the Close button.
Thermo Scientific
Choose Print Setup from the File menu to set options that affect the
printing of the security database before printing the database. See Printing
the security database for instructions for printing the database.
Choose Print from the File menu to print the contents of the security
database. If you would like to view the database before printing it, use
Print Preview in the File menu. (You can also print the database using the
Print button in the preview window.) See Previewing the security
database for details. If you would like to set some print options such as
paper size and page orientation, use Print Setup in the File menu. See
Setting the print options for details.
65
Exiting Security
Administration
Note
66
Thermo Scientific
Troubleshooting
Troubleshooting
The troubleshooting table below will help you solve problems that may
occur when you log into a client application. If you are unable to solve a
problem after following the provided instructions, use the information at
the beginning of this document to contact us.
Problem
What To Do
Verify that the user has the right to access the computer from the
network. See Local and global user groups and rights in the Overview
of Windows Administration chapter for more information.
Thermo Scientific
Verify that the user is currently logged on to Windows software. This can
be done by logging off Windows software and then logging back on.
Attempt to log into the client application again.
67
Troubleshooting
Problem
What To Do
This occurs because Windows software turns off the ability to sign data if
the password is changed by an administrator rather than by the account
owner. This can be caused by a permissions problem on a computer with
an NTFS file system. Make sure the user has appropriate permissions in
the locations described below. (Note: This information applies only to
NTFS file systems.)
1. In Windows Explorer enable the ability to see hidden files.
2. Browse to <root drive letter>:\Documents and
settings\<user name>\Application
data\Microsoft\Crypto\RSA. For example, the path for the
68
Thermo Scientific
Index
Index
A
access control
client application, 45, 51, 52
Security Administration and client applications, 41
accounts
setting up for client application, 32
Add Application command, 43
adding
signature meaning, 61
Administer Security Database, 41
application
adding, 43
removing, 44
editing
policy group name, 56
signature meaning, 62
electronic signature
meanings, 58, 60, 61
Event Log service, 13
event logging, 13
Event Viewer, 13
Exit command, 66
exiting Security Administration, 66
expiration date of user account, 21
C
client, 3
client application
access to, 41
access to features in, 45, 51, 52
adding, 43
event logging, 13
Help, 40
removing, 44
security policies, 45
setting up accounts for, 32
signature meanings, 58
system polices, 53
user name and password, 11, 12
computer
locking, 13
restricting user access to, 21
D
database. See security database
deleting
policy group, 56
signature meaning, 62
desktop, 20
domain, 3
domain controller, 4
G
global group, 5
rights, 20
group
rights, 20
group account, 5
H
Help, 40
client application, 40
context-sensitive, 40
Security Administration, 40
I
installing Security Administration, 28
L
local group, 6
rights, 20
locking out user after failed logon, 13
locking workstation, 13
logon, 12, 13
M
multiple (trusted) domain model, 7
mutual trust relationship, 4
Thermo Scientific
69
Index
N
navigation pane, 38
network
concepts, 3
terminology, 3
types, 6
network administrator, 9
network server, 3
O
one-way trust relationship, 4
P
password, 11, 12
age and length, 12
assigning, 12
changing, 12
peer-to-peer workgroup, 8
permission, 5
policy group
adding users or removing users from, 57
creating, deleting or editing name of, 56
Print command, 65
print options, 65
Print Preview command, 64
Print Setup command, 65
printing
security database, 64, 65
profile of user, 20
R
Remove Application command, 44
right, 4
rights
group, 20
S
Save Settings command, 63
saving
security policies, 63
screen saver, 13
security
Windows, 12
Security Administration
access to, 41
70
described, 1
exiting, 66
Help, 40
installing, 28
setting up client application accounts using, 32
starting, 37
Security Administration window, 38
security database
printing, 64, 65
setting print options for printing, 65
viewing, 64
security policies, 45
saving, 63
Select Next command, 39
Select Previous command, 39
server, 3
Thermo Security Service on, 30, 36
service accounts, 26
signature
adding meaning for, 61
deleting meaning for, 62
editing meaning for, 62
meanings, 58, 60, 61
single domain model, 6
stand-alone configuration, 8
starting Security Administration, 37
status bar
displaying, 39
Status Bar command, 39
system administrator, 10
system policies, 53
telephone numbers, 67
terminology for networks, 3
Thermo Log Service, 44
Thermo Security Service, 1
not found, 30, 36
time
restricting user access to specific, 21
toolbar
displaying, 38
Toolbar command, 38
troubleshooting, 67
trust relationship, 4
two-way trust relationship, 4
Thermo Scientific
Index
user
adding or removing from policy group, 57
locking out after failed logon, 13
profile, 20
setting up, 11
signature meaning assignments, 58, 60
user account
expiration date, 21
user name, 11, 12
Windows
administration overview, 3
administration setup, 23
logon, 12
security features, 12
setting up, 23
user name and password, 11
workgroup, 8
workstation
locking, 13
restricting user access to, 21
Thermo Scientific
71