Managing network security

This section describes the steps to maintain networkA network is a visual summary, generated by Sintelix, of the information in one or more documents. security based on the Sintelix security model. For information about this model see Setting up security.

Network security metadata is inherited from the collectionsA collection is a container for storing and organising ingested files and documents. Only the textual content is stored in collections, not the original files and documents. that are used to create the network. When you create a network, choose a collection or collections that have the security metadata you want assigned to your network, then follow the steps below to create a new network.

In the network list, icons are used to indicate the access status of networks. The icons are described in Table 1 below.

Table 1: Security icons

Icon

Status

Description

Unsecured

Any user can access (open) the network if they can also access the project.

Secured and accessible to the currently logged in use

Only users with access privileges can open the network.

When a user is logged in: if access to the network has been secured and a user has access privileges, this icon is shown beside the network name.

When an administrator is logged in: in the Sintelix security model there are no restrictions on administrators accessing networks. If access to the network has been secured, this icon is shown beside the network name and the administrator can open the network.

Secured and inaccessible to the currently logged in user

Security has been applied to the network and only users with sufficient security privileges can open it.

When a user is logged in: if access to the network has been secured and a user does not have sufficient privileges, this icon is shown beside the network name and the name is greyed out, preventing the user from clicking on it.

When an administrator is logged in: this icon is not used as there are no restrictions on administrators accessing networks in the Sintelix security model. If access to the network has been secured, the yellow ‘Secured’ icon is shown beside the network name and the administrator can open the network.

 

fontfontfont