Security User Guide
Security User Guide
User’s Guide
FCM Suite document
Security User Guide
Internet
Temenos Company
2 Rue de l’Ecole-de-Chimie
CH - 1205 Geneva
Switzerland
This product contains computer software documentation which is the property of Temenos.
The information must not be made available to, or copied or used by anyone outside
Temenos without its written authorization.
Temenos - Property
2
Security User Guide
Table of Contents
Chapter1. About This Publication .............................................................................................. 5
Related information ................................................................................................................ 5
Document pertinence ............................................................................................................. 5
Audience ................................................................................................................................ 5
Special Conventions .............................................................................................................. 6
Summary of Changes ............................................................................................................ 6
Introduction to Security Module ............................................................................................. 6
Chapter2. Getting Started with Security Module ....................................................................... 8
Chapter3. Manage Users .......................................................................................................... 9
Users ...................................................................................................................................... 9
Creating a new User ........................................................................................................... 9
Deleting a User ................................................................................................................. 10
Profiles ................................................................................................................................. 12
Creating a new Profile ...................................................................................................... 12
Editing a Profile ................................................................................................................ 13
Deleting a Profile .............................................................................................................. 14
Manage Roles .......................................................................................................................... 16
Creating a new Role............................................................................................................. 16
Editing a Role ....................................................................................................................... 17
Deleteting a Role .................................................................................................................. 18
Manage Mandators .................................................................................................................. 20
Creating a new Mandator ..................................................................................................... 20
Editing a Mandator ............................................................................................................... 22
Deleting a Mandator ............................................................................................................. 22
Manage References ................................................................................................................ 25
Zones ................................................................................................................................... 26
Creating a new Zone ........................................................................................................ 26
Editing a Zone .................................................................................................................. 28
Deleting a Zone ................................................................................................................ 29
Countries .............................................................................................................................. 31
Creating a new Country.................................................................................................... 31
Edit a Country ................................................................................................................... 33
Deleting a Country ............................................................................................................ 33
Currency ........................................................................................................................... 35
Creating a new Currency.................................................................................................. 35
Edit a Currency ................................................................................................................. 36
Deleting a Currency .......................................................................................................... 37
Data export .............................................................................................................................. 39
Temenos - Property
3
Security User Guide
HEADQUARTERS SA.
Temenos - Property
4
Security User Guide
This publication describes the Security Module application that is a component of the FCM
Suite solution. The Security Module is a high performance user interface that configures the
user access and segregation.
The purpose of this guide is to help Security Module users to manage:
- Users;
- Profiles;
- Mandators;
- Zones;
- Countries;
- Currencies.
Related information
For information about Temenos products, see: Temenos Company Web site
(http://www.temenos.com)
Document pertinence
This document applies to the FCM Suite projects.
Audience
This guide is intended for engineers responsible for day-to-day optimization of the application.
Temenos - Property
5
Security User Guide
Special Conventions
Convention Meaning
Bold - Object of an action: menu names, field names, options, button names
- Commands typed at a prompt
- User input
Italic - Names of books, chapters and sections as references
- Emphasis
Monospace - Directories and subdirectories
- File names and extensions
- Process names
- Code sample, including keywords and variables within text and as separate paragraphs,
and user-defined program elements within text
<Variable> - Substitute input value
Summary of Changes
General changes -
New information -
Changed information -
Deleted information -
The FCM Suite system is designed to scan messages made across international borders. The
system is verifying if the payer, payee, and the payment narrative are subject to one, or more
of the following criteria:
The Security module is part of FCM Suite, being a software solution that screens large
volumes of payments quickly and accurately.
First authentication of the users is done by the application server. Information about proper
configuration of the application server is included in the installation guides.
The access to each module is controlled through the Security module, and by the rules
defined in Rule Manager.
Each user that accesses FCM Suite must be registered within the Security module. It is
possible to define any number of profiles in Security module, and each user need to be
assigned to one of them.
Each profile has a set of roles for different mandators:
Temenos - Property
6
Security User Guide
Profile 1 Profile 2
Mandator 2
Mandator 1
Mandator 2
Mandator 1
Mandator1
Mandator1
Role 1:
Role 2:
Role 2:
Role 3:
Role1:
Role1:
For more information about the Rule Manager application, and the mechanism on which the
user access rights are calculated, refer to Rule Manager User Guide.
Temenos - Property
7
Security User Guide
This section describes how to initialize and perform simple tasks using Security Module.
http://hostname:port/vrisk/app/
Where:
- hostname: the host or the IP address of the server containing the FCM Suite
applications;
The user can select the part of the application that want managed:
- Manage Users;
- Manage Roles;
- Manage Mandators;
- Manage References.
Note: The access of different Security component modules depends on the rules for the
Security module, and the user profile.
Temenos - Property
8
Security User Guide
Users
To create a user:
E.g.:
Temenos - Property
9
Security User Guide
E.g.:
E.g.:
Note: To find a user, type the name in Search User field and press Enter.
E.g.:
Deleting a User
Temenos - Property
10
Security User Guide
2. Click Delete.
E.g.:
Temenos - Property
11
Security User Guide
Profiles
Temenos - Property
12
Security User Guide
E.g.:
Note: When a new profile is created, the user can only add the Id and the description.
E.g.:
Editing a Profile
Temenos - Property
13
Security User Guide
Note: The Id filed cannot be changed. The user can only edit the following:
- Description;
- Role;
- Mandator.
E.g.:
The roles are only added in pair with Mandator. There is no possibility to add a role that
applies for all mandators. If you add a role with mandator ALL, then you can only access the
items that have mandator ALL, and no other mandators.
E.g.: public entries in the Watch List Manager, but not entries of private lists.
Note: In some cases the mandator value is not important for roles. For more information refer
to Rule Manager User Guide.
Deleting a Profile
Temenos - Property
14
Security User Guide
E.g.:
2. Click Delete.
Note: A profile is removed if no users are assigned to it. If it is not the case, warning
is displayed.
Temenos - Property
15
Security User Guide
Manage Roles
In Security page, select Manage Roles and click. The Manage Roles page is displayed:
1. Click Create new Role button. The following right panel is displayed:
E.g.:
Temenos - Property
16
Security User Guide
E.g.:
E.g.:
Note: If you create a role that has the same details or name, the following information
is displayed:
Editing a Role
E.g.: PRO_REPORT1
Note: The Id field cannot be changed. The user can only edit the description.
Temenos - Property
17
Security User Guide
E.g.:
Deleteting a Role
Note: A role cannot be removed if is in use. Therefore, ensure that is not referenced
by any profiles before removing.
2. Click icon.
Temenos - Property
18
Security User Guide
E.g.:
E.g.:
Temenos - Property
19
Security User Guide
Manage Mandators
In Security page, select Manage Mandators. The Manage Mandators page is displayed:
Note: Values for Country and Currency are loaded from the database. To limit unnecessary
load on the database, these values are not refreshed while working with mandators. When
values change, the user does not see the changes, until the whole page is opened again from
the Security module home page.
1. Click Create new Mandator button. The following right panel is displayed:
2. Enter the Id :
E.g.:
Temenos - Property
20
Security User Guide
E.g.:
E.g.:
E.g.:
E.g.:
E.g.:
E.g.:
Temenos - Property
21
Security User Guide
Editing a Mandator
E.g.: 001
Note: The Id field cannot be changed. The user can only edit the following:
- Currency
- Country
- GMT Offset
- Email
- Description
- Country
- Zone
Deleting a Mandator
Temenos - Property
22
Security User Guide
2. Click icon.
E.g.:
E.g.:
Temenos - Property
23
Security User Guide
Note: If is used, a mandator cannot be removed. Therefore, ensure that mandator is not
referenced by any profiles before removing.
Temenos - Property
24
Security User Guide
Manage References
This section describes how to manage the Zones, Countries and Currencies that are used
throughout the FCM Suite.
In Security page, select Manage References. The Manage References page is displayed:
Temenos - Property
25
Security User Guide
Zones
This sections describes how to create, edit, and delete a zone.
The Zones page is displayed:
1. Click on Create New Zone button. The following below panel is displayed:
E.g.:
Temenos - Property
26
Security User Guide
E.g.:
E.g.:
E.g.:
Temenos - Property
27
Security User Guide
Editing a Zone
To edit a role:
E.g.: ALLin
Note: The Id filed cannot be changed. The user can only edit the following:
- Name
- Description
2. Click Save.
E.g.:
Temenos - Property
28
Security User Guide
Deleting a Zone
Temenos - Property
29
Security User Guide
2. Click icon.
E.g.:
Temenos - Property
30
Security User Guide
Countries
1. Click Create New Country button. The following below panel is displayed:
Temenos - Property
31
Security User Guide
2. Complete the country details: Code, Code3, Name, and Numeric Code.
Temenos - Property
32
Security User Guide
E.g.:
Editing a Country
To edit a role:
- Code3
- Name
- Numeric Code
Deleting a Country
Temenos - Property
33
Security User Guide
2. Click icon.
Temenos - Property
34
Security User Guide
Currency
1. Click Create New Currency button. The following below panel is displayed:
E.g.:
E.g.:
Temenos - Property
35
Security User Guide
E.g.:
Edit a Currency
To edit a role:
1. From the list, select the role that you want edited.
E.g.:
Temenos - Property
36
Security User Guide
Note: The Code field cannot be changed. You can only edit the name of the
currency.
Deleting a Currency
E.g.:
Temenos - Property
37
Security User Guide
2. Click icon.
E.g.:
Temenos - Property
38
Security User Guide
Data export
The Security component exports all the data to CSV format. Each table that the Security
component operates on can be exported separately.
Export option is available next to the tables with data that can be exported:
E.g.:
The table below provides the list of entities, that can be exported along with exported data,
and table from database on which export is run.
Exported data
Temenos - Property
39
Security User Guide
Temenos - Property
40
Security User Guide
Advanced Due Diligence A term used by risk and compliance officers, to describe the
process of a difficult investigation.
Alert An alarm or other signal of risk.
E
Enabled Indicates if the entry is enabled or not
F
FCM Financial Crime Mitigation
Temenos - Property
41
Security User Guide
Temenos - Property
42