Topic 12: System Administration Flashcards

1
Q

What are the two contact level security models?

A

Shared - Contact can have more than one label

Unique - Contact can have only one label

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a contact level security program?

A

A contact level security program determines when to assign a label to a contact based on a contact field value relating to a contact label category. (i.e. business unit custom field).

Labels can be associated with security groups, so only users in the correct security groups have access to the contact data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the first step in the contact level security program?

A

Eloqua recommends to “remove all contact labels” as the first step in the assignment program.

(Source: http://topliners.eloqua.com/docs/DOC-3343 page 5 of PDF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Contact Level Security?

A

Contact Level Security provides the ability to manage contact security across different users within an organizationFor example, users from one region or business unit should not be able to access or communicate to specific contacts from another region or business unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How/Where do you set campaign specific permissions?

A

Campaign permissions can be set by

  1. selecting “Permissions” from the Gear drop down within a campaign,
  2. clicking the + button, selecting “Add User” or “Add Group”,
  3. searching for the desired user or group, and clicking “Add”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where/ how do you set permissions for users (that impact what elements they have access to on their dashboard)?

A

The elements a user has access to depends on which security group to which they belong.

Adding a User to a Security Group:

  1. Navigate to Setup » Users » Users tab
  2. Select Desired User
  3. update the “Selected security groups” under the “Security Groups” section on the “Edit User” screen.

Modifying a security groups access:

  1. Navigate to Setup » Users » Groups tab
  2. Select Desired Group
  3. “Select Interface Access” from “Security Group Overview” screen
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 permission settings that can be toggled on or off from within the campaign permissions window?

A

View - User/Group can view the campaign.
Edit - User/Group can edit campaign.
Delete - User/Group can delete campaign.
Edit Security - User/Group can manage campaign security settings.
Activate - User/Group can activate the campaign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You belong to two security groups, one allows you to delete contacts another does not, what happens?

A

The contact can be deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the recommended method of creating custom security groups?

A

duplicate an existing security group and modify the copy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You configure and test Contact Level Security using a small group of test records. Where do you validate the results and which report do you run?

A

Setup > Users: “Contacts by Label”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly