Help Site

Glossary of Terms found in the Security Module

Updated on

A

Access Control: Measures that ensure only authorized users can access certain resources.

Authentication: The process of verifying the identity of a user or system.

Authorization: The process of determining what resources a user is permitted to access.

B

Batch User: An employee user account created in bulk with other employee users, processed in one transaction using the batch user feature.

C

Cipher: An algorithm for performing encryption or decryption.

Changing Passwords: The process of updating a user’s password to maintain security.

Core User: A primary user who has extensive access and responsibilities within the system, particularly to the HRplus core modules such as Personnel, Payroll, Benefits, etc.

D

Data Encryption: The process of converting plain text into a coded format to prevent unauthorized access.

E

Encryption Key: A piece of information, in a form of a string of characters, used by an encryption algorithm to transform plain text into ciphertext or vice versa.

F

Firewall: A network security system that monitors and controls incoming and outgoing network traffic.

G

Global ID: A unique identifier assigned to a user that can be used across multiple systems.

Grant/Revoke Company Access: The process of allowing or denying a user the ability to access company resources.

L

Login Activity: The tracking and monitoring of user login attempts and sessions.

M

Mail Server: A server that handles and delivers email over a network.

Mail Server IP Address: The specific IP address assigned to a mail server for communication purposes.

Malware: Malicious software designed to harm, exploit, or otherwise compromise a computer system.

Make Duplicate User IDs Unique: The process of ensuring each user ID within a system is distinct to prevent conflicts and ensure proper identification.

Module Audit: The process of reviewing and ensuring that a security module is functioning correctly and securely.

Multi-Factor Authentication (MFA): A security system that requires more than one method of authentication from independent categories of credentials.

N

New User: An individual who has recently been granted access to a system and has a newly created account.

P

Pay Group Access: Permissions granted to a user to access specific payroll groups within HRplus.

R

Restrict Position Access: Limiting a user's ability to view or interact with sensitive data, based on their job role or position within the organization.

Random Password: A system-generated password with a random sequence of characters, sent to batch users via email to ensure unique and secure initial access.

Reset Password: The process of changing a user’s password, typically when it is forgotten or compromised.

Restrict User Reports: The process of limiting a user’s ability to access certain reports within a specific HRplus module.

S

Self Service User: A user with permissions to manage their own information, such as viewing payslips, personal details, and password resets.

Single Sign-On (SSO): An authentication process that allows a user to access multiple applications with one set of login credentials.

Static Password: A password that is entered by the system administrator when creating batch users. The password is the same for all users, and two-factor authentication must be enabled when this option is being used.

T

Two-Factor Authentication (2FA): A method of confirming a user's claimed identity by utilizing a combination of two different factors: something they know, something they have, or something they are.

U

Unlink Employee Profile: The process of disconnecting an employee’s profile from a user account.

User Database: A central repository of user information, including personal details, job history, and access permissions.

User Group: A collection of users with similar access rights and permissions to the same module or module features within HRplus.

User ID: A unique identifier assigned to a user for accessing a system.

User ID Protocol: The guidelines and rules for creating and managing user IDs within a system.

User Signature: A digital representation of a user's signature used for authentication and authorization.

V

Virtual Private Network (VPN): A service that encrypts your internet traffic and protects your online identity by hiding your IP address.

Vulnerability: A weakness in a system or its design that could be exploited by a threat to gain unauthorized access to or perform unauthorized actions on a computer system.

0 Comments

Add your comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Previous Article A Guide to using the Security Module
Next Article Security Module Updates: What's New?
Still Need Help? Contact Us