Unit 2- Lesson 5- IBM curam SPM administration-done Flashcards
What is Curam administration
Curam administation allows you to manage and define all areas of the curam application
What is security administration divided into
Autentication- ensures that only valid users can access the application by requiring them to provide a valid user name and password
Authorization- secures the application once a valid user is successfully logged in
What is a security identifier
A security identifier (SID) represents a protected resource. Every secured element in Cúram is given a unique SID
What is a security group?
A security group is the grouping of security identifiers.
What is a security role
A user has only one security role. A security role might consist of multiple security groups, which specify the SIDs that a user can access.
What is a location
Locations are the workplaces of the users. all locations have an address
What is sensitivity security
curam enables you to assign a sensitivity level to certain objects for example participants, user. The range from 1-5,5 being the highest
What are user skills
Each member of an organisation has a set of skills and competencies that can be graded according to experience and performance e.g. counseling, computing, language skills
What is the reporting hierarchy?
The reporting hierarchy is the chain of command tat determines the supervisors in the organisation structure and the users that report to them
What are batch processes
Batch processes are executable files or mini-programs that process many records according to set parameters
Which organisation structure element (organisation unit, position, job and user) is used to determine who a person reports to?
Position
What are rate tables used for?
To store values that change over time
True or false: you can clone an organisation structure
True
How many organisation structures can be active at one time? How many root units are allowed in an organisation structure
One, one
What administration component is used to record payment exclusion date? List the five types of this component
Answer- organisation calendar
Banks, Bank accounts, exchange rates, financial processing calendar and insurance return periods
True or false: in the curam data model, jobs are directly linked to users?
false
Sensitivity security is applied to which four areas
Users, participants, notes and work queues
True or false: locations represent the workplaces of the agencys clients
false
What must you be sure to do in order to see or use change made to code table values
Publish the changes made to the code table
List the two types of communication templates
Extensible style language (XSL) and microsoft word
List two resources types that can be assigned a security identifier
Business processes and organisation units
Mary and Kevin are caseworkers assigned to different locations within the organisation. When mary performs a search for one of kevins clients she can see that the client is registered in the system but she cannot see the clients address date of birth or any other information about the client. In this scenario what is the location data security setting for the system
Restricted view
What are application properties
Application properties are variables used to configure the system to suit the organisation’s needs