Skip to Main Content
Idea Portal
ADD A NEW IDEA

Security & Compliance

Showing 12 of 252

Information pages for services

Hello SER, Currently the info pages can only be activated or deactivated. Exceptions are the CSB info page and the HCS info page. CSB Info page = can only be accessed from the localhost. HCS info page = cannot be disabled. The information ...
Martin Granz 3 months ago in Security & Compliance 0

More options for restricting rights in the Business Studio

We want to activate the Businessstudio for users so that they can customize the contents of value lists independently. Accordingly, we have created a test user and tried to restrict it so that it can only customize value lists. For some functions,...
David Hoch 9 months ago in Security & Compliance 1 Planned

Password configurable about how many changes in a time.

RIAM-036. Passwords must not be allowed to be changed multiple times within 24 hours. The time limitation where it is not allowed to change the password must be configurable. (CSB-I-183)
Maximillian Alexander Stringer 9 months ago in Security & Compliance 0

Access to the keystore for storage encryption

Hello, currently the keystore which contains the encryption key for storage encryption can't be accessed. Therefore the key, inside the keystore, can only be stored digitally. Some of our customers want to store their keys physically, because the ...
Stephan Herbertz 4 months ago in Security & Compliance 0

Assign Roles and Rights with time restrictions

Often we get request zu assign a group or role for a limited time for example if an aprentice is working in a departtmen vom 1.1.2022 - 31.3.2022 the accesss rights should be effective in this time range. It would be helpful if wee could assigne t...
Knut Pape about 3 years ago in Security & Compliance 3 Will not implement

Better Management of Roles, Grupes and Rights

It would be helpful if we could name responsible Persons for Roles, Groups, Databases. In our Organisation this would make it easy to find out who is the Data-Owner- the one who is responsible for the data and who is in charge to accept or reject ...
Knut Pape about 3 years ago in Security & Compliance 2 Future consideration

Signierte Programme

Durch verschiedene Security Tools werden unsignierte Programme in unserem Netzwerk standardmäßig blockiert. Es wäre gut, wenn in zukünftigen Versionen die ausführbaren Programme wie csbcmd.exe signiert werden.
Guest 12 months ago in Security & Compliance 0

Verwendung des verschlüsselten Passworts aus DOXiS4-PasswordEncrypter in dx4-sessionpool-api

ist es möglich das verschlüsselte Kennwort des DOXiS4-PasswordEncrypter, im Format "ENC2(...)" beim Setzen der Credentials für einen Login via dx4-sessionpool-api mitzugeben? - Meine bisherigen Versuche waren leider erfolglos.Falls aktuell nicht m...
Guest over 1 year ago in Security & Compliance 0 In Review

Audit Trail Auswertung auch für gelöschte Kennungen ermöglichen

Bisher ist es nur möglich, nach Aktivitäten bestehender Kennungen über die Audit-Trail-Suche zu recherchieren. Wir benötigen diese Funktion jedoch auch für Kennungen, die bereits gelöscht worden sind.
Lutz Hensel about 1 year ago in Security & Compliance 0

Add the right for changing descriptors not overall, but per hitlist

Currently i can give the Right to change descriptors only in general; yes or no. So users with it can use it on all hitlists, or none. Especially in bigger organisations when you give that right to someone who is a key user for A, he is able to us...
Andreas Obermaier almost 2 years ago in Security & Compliance 1 Will not implement