Skip to main content
Version: 6.0

User Management

Case Manager 6 features a massive improvement in its user management capabilities. Along with the Data Type Models it provides structure to manage fine-grained security in what users can see and do. Further, it gives the tools to distribute work and responsibilities effectively. This document describes the user management functionality in detail and aims to help you utilize it to the advantage of your organization. We will start off with setting up your users in an organizational hierarchy, explore the newly introduced Security Roles, detail user authentication in the Case Manager applications, and give an overview of the use of Workgroups in Case Manager.

Definitions

User
A user in Case Manager represents a person or process that can log into the system and perform actions. These actions are guarded by the security. A user is represented by the icon (or if it is the user currently logged in).
Team
A team is a group of users and/or other smaller teams. This gives us a hierarchical structure of all users in the organizational structure, with Organization at the root of the structure. A team is represented by the icon.
Workgroup
A Workgroup is either a user or a team. Typically we refer to a workgroup where we can assign a user or a team. For example, a case or an instruction can be assigned to either.
Security Right
A security right is a single access right that can be assigned to a user or role that gives access to specific functionality.
Security Role
A role is a set of security rights. When a role is assigned to a user, the user’s security rights will be that of the role only.
Administered Workgroup
Certain functionality, such as Queues and the Diary, support user access over a specific branch of the organization hierarchy. The Administered Workgroup specified the top level of the branch the user has access to.
System User
A System user cannot be created or deleted. These users are hidden from the organization hierarchy, the login form list, and certain actions in Case Manager related to the workgroup. These users are in general used to perform specific automated tasks, and to give support.
Field Security
Read and Write access to fields can be guarded by custom security rights, which may be assigned to data fields in the Data Type Model. Administrators can create and delete these security rights as needed.

Documents

  • Settings Control: Set up and configure your user and team hierarchy including user security.
  • Security Roles: Set up Security Roles to easily manage user authorization in Case Manager 6.
  • Login Options: Explore the different login options for Case Manager applications.
  • Workgroup Selection: Understand how the workgroup hierarchy influence workgroup selection in Case Manager.