____________records are used in conjunction with user and provider records to give employees
access to activities in the system. Security and Role
____________ is used to give "access" or "permission" to activities and information within Epic
Security
There are two key security concepts: security points and security classes.
Grants access to one feature within Epic. Think of these like a key that grants you access to one
room.
If a user has a security point, they have access to an activity. If they do NOT have the required
security point, then the activity will not be available to them; they won't even see it.
Security Point
Grouping of security points that grant access to related activities and functionality in an Epic
application. Think of this as a ring of keys (security points). Security Class
The __________ defines the visual appearance or layout of Hyperspace. User Role
, COG170 Security Questions With Solutions
Three things a user role controls: 1. What activities open upon logging in
2. What buttons you have across your top toolbar and under the Epic button
3. How long the system will stay idle before logging you out
Before a user can access dashboards, Workbench reports, and SlicerDicer, they need to be
assigned security to the proper functionality.
To control Radar, SlicerDicer, and Reporting Workbench functionality: 1. Define the
security points on the class
2. Assign the class to users
To define Reporting Workbench security classes, open an existing class or create a new one in
the Reporting Workbench Security Class Editor
To define Radar security classes, open an existing class or create a new one in the Radar
Security Class Editor.