0% found this document useful (0 votes)
136 views42 pages

Security User Guide

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
136 views42 pages

Security User Guide

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 42

Security

User’s Guide
FCM Suite document
Security User Guide

0.2 Version (January 2016)

Internet

Visit our home page: http://www.temenos.com

Temenos Company
2 Rue de l’Ecole-de-Chimie
CH - 1205 Geneva
Switzerland

The information presented is subject to change without notice. Temenos assumes no


responsibility for inaccuracies contained herein.

© Copyright Temenos Headquarters 2007, 2016. All rights reserved.

This product contains computer software documentation which is the property of Temenos.
The information must not be made available to, or copied or used by anyone outside
Temenos without its written authorization.

Not to be used or disclosed except in accordance with applicable agreements.

Temenos - Property

2
Security User Guide

Table of Contents
Chapter1. About This Publication .............................................................................................. 5
Related information ................................................................................................................ 5
Document pertinence ............................................................................................................. 5
Audience ................................................................................................................................ 5
Special Conventions .............................................................................................................. 6
Summary of Changes ............................................................................................................ 6
Introduction to Security Module ............................................................................................. 6
Chapter2. Getting Started with Security Module ....................................................................... 8
Chapter3. Manage Users .......................................................................................................... 9
Users ...................................................................................................................................... 9
Creating a new User ........................................................................................................... 9
Deleting a User ................................................................................................................. 10
Profiles ................................................................................................................................. 12
Creating a new Profile ...................................................................................................... 12
Editing a Profile ................................................................................................................ 13
Deleting a Profile .............................................................................................................. 14
Manage Roles .......................................................................................................................... 16
Creating a new Role............................................................................................................. 16
Editing a Role ....................................................................................................................... 17
Deleteting a Role .................................................................................................................. 18
Manage Mandators .................................................................................................................. 20
Creating a new Mandator ..................................................................................................... 20
Editing a Mandator ............................................................................................................... 22
Deleting a Mandator ............................................................................................................. 22
Manage References ................................................................................................................ 25
Zones ................................................................................................................................... 26
Creating a new Zone ........................................................................................................ 26
Editing a Zone .................................................................................................................. 28
Deleting a Zone ................................................................................................................ 29
Countries .............................................................................................................................. 31
Creating a new Country.................................................................................................... 31
Edit a Country ................................................................................................................... 33
Deleting a Country ............................................................................................................ 33
Currency ........................................................................................................................... 35
Creating a new Currency.................................................................................................. 35
Edit a Currency ................................................................................................................. 36
Deleting a Currency .......................................................................................................... 37
Data export .............................................................................................................................. 39

Temenos - Property

3
Security User Guide

Acronyms & Glossary .............................................................................................................. 41

HEADQUARTERS SA.

COPYRIGHT 2007 - 2010 TEMENOS HEADQUARTERS SA. All rights reserved.

Temenos - Property

4
Security User Guide

Chapter1. About This Publication

This publication describes the Security Module application that is a component of the FCM
Suite solution. The Security Module is a high performance user interface that configures the
user access and segregation.
The purpose of this guide is to help Security Module users to manage:
- Users;
- Profiles;
- Mandators;
- Zones;
- Countries;
- Currencies.

Related information

For information about Temenos products, see: Temenos Company Web site
(http://www.temenos.com)

For information about related products, see:

 Alert Manager User’s Guide;


 Profiling User’s Guide;
 Rule Manager User’s Guide;
 Reports User’s Guide;
 Security User’s Guide;
 KC+ User’s Guide;
 Watch List Manager User’s Guide;
 Web Inquiry User’s Guide;
 Application Run Manual;
 Rule Editor User’s Guide.

Document pertinence
This document applies to the FCM Suite projects.

Audience
This guide is intended for engineers responsible for day-to-day optimization of the application.

Temenos - Property

5
Security User Guide

Special Conventions

Conventions used in this guide:

Convention Meaning
Bold - Object of an action: menu names, field names, options, button names
- Commands typed at a prompt
- User input
Italic - Names of books, chapters and sections as references
- Emphasis
Monospace - Directories and subdirectories
- File names and extensions
- Process names
- Code sample, including keywords and variables within text and as separate paragraphs,
and user-defined program elements within text
<Variable> - Substitute input value

Summary of Changes

This publication contains additions and changes to information previously presented in


Security Module User's Guide.

General changes -
New information -
Changed information -
Deleted information -

Introduction to Security Module

The FCM Suite system is designed to scan messages made across international borders. The
system is verifying if the payer, payee, and the payment narrative are subject to one, or more
of the following criteria:

- Watch lists of individuals or entities to which sanctions apply.


- Payments made from/to countries listed on the Financial Action Task Force on Money
Laundering’s Non-Compliant Countries or Territories list.
- Payments made to individuals or entities listed on the Office of Foreign Assets (OFAC)
register.

The Security module is part of FCM Suite, being a software solution that screens large
volumes of payments quickly and accurately.
First authentication of the users is done by the application server. Information about proper
configuration of the application server is included in the installation guides.
The access to each module is controlled through the Security module, and by the rules
defined in Rule Manager.
Each user that accesses FCM Suite must be registered within the Security module. It is
possible to define any number of profiles in Security module, and each user need to be
assigned to one of them.
Each profile has a set of roles for different mandators:

Temenos - Property

6
Security User Guide

User 1 User 2 User 3

Profile 1 Profile 2
Mandator 2

Mandator 1

Mandator 2

Mandator 1
Mandator1

Mandator1
Role 1:

Role 2:

Role 2:

Role 3:
Role1:

Role1:

For more information about the Rule Manager application, and the mechanism on which the
user access rights are calculated, refer to Rule Manager User Guide.

Temenos - Property

7
Security User Guide

Chapter2. Getting Started with Security Module

This section describes how to initialize and perform simple tasks using Security Module.

To access the Security Module:

1. Access the following URL, using a web browser:

http://hostname:port/vrisk/app/

Where:

- hostname: the host or the IP address of the server containing the FCM Suite
applications;

- port: the TCP port number listening to HTTP requests.


Note: You need to contact the system administrator for the values that apply to
your organisation.

2. Log in the application by typing your user name and password.

3. Click OK to start the application.

4. In FCM Suite home page, select one of Security submenu.

The user can select the part of the application that want managed:

- Manage Users;
- Manage Roles;
- Manage Mandators;
- Manage References.
Note: The access of different Security component modules depends on the rules for the
Security module, and the user profile.

Temenos - Property

8
Security User Guide

Chapter3. Manage Users

In Security page, select Manage Users.


The Manage Users is displayed:

Users

This section describes how to manage the users.

Creating a new User

To create a user:

1. Click Create User button. The following page is displayed :

2. In User, enter the name:

E.g.:

3. In Profile, select the user profile:

Temenos - Property

9
Security User Guide

E.g.:

4. Click Save. The user is created. Default user password is change123Me.

E.g.:

Note: To find a user, type the name in Search User field and press Enter.

E.g.:

Deleting a User

To delete an existing user:

1. From the list, select a user.

Temenos - Property

10
Security User Guide

2. Click Delete.
E.g.:

3. You are asked to confirm the deletion :


E.g.:

Click Confirm. The selected user is deleted.

Temenos - Property

11
Security User Guide

Profiles

This section describes how to manage the profiles.


Examples of profiles:

Creating a new Profile

A profile is a collection of capabilities associated with a mandator. One profile is associated to


each user.

To create a new profile:

1. Click on Create Profile. The following right panel is displayed:

Temenos - Property

12
Security User Guide

2. In Profile details, enter the Id and Description of the profile.

E.g.:

Note: When a new profile is created, the user can only add the Id and the description.

3. Click Save. The new profile is created.

E.g.:

Editing a Profile

To edit an existing profile:

1. From the list, select the profile.

Temenos - Property

13
Security User Guide

E.g.: For Evaluator1 profile, the Description field is changed:

Instead of Alert evaluator, add Alert evaluator – Test:

Note: The Id filed cannot be changed. The user can only edit the following:

- Description;
- Role;
- Mandator.

2. Click Save. The profile is updated.

E.g.:

The roles are only added in pair with Mandator. There is no possibility to add a role that
applies for all mandators. If you add a role with mandator ALL, then you can only access the
items that have mandator ALL, and no other mandators.
E.g.: public entries in the Watch List Manager, but not entries of private lists.

Note: In some cases the mandator value is not important for roles. For more information refer
to Rule Manager User Guide.

Deleting a Profile

To delete an existing profile:

1. From the list, select the profile.

Temenos - Property

14
Security User Guide

E.g.:

2. Click Delete.
Note: A profile is removed if no users are assigned to it. If it is not the case, warning
is displayed.

3. You are asked to confirm the deletion.


E.g.:

Click Confirm. The selected profile is deleted.


Note: To delete a profile you do not need a confirmation from the user.

Temenos - Property

15
Security User Guide

Manage Roles

In Security page, select Manage Roles and click. The Manage Roles page is displayed:

Creating a new Role

To create a new role:

1. Click Create new Role button. The following right panel is displayed:

2. Enter the Id:

E.g.:

Temenos - Property

16
Security User Guide

Note: This field is mandatory. The ID is referenced in the interfaces of Rules


Manager, so the Id needs to be valid.

3. In Description, enter the role characteristics.

E.g.:

4. Click Save. The role is created.

E.g.:

Note: If you create a role that has the same details or name, the following information
is displayed:

Editing a Role

To edit an existing role:

1. From the list, select the role.

E.g.: PRO_REPORT1

Note: The Id field cannot be changed. The user can only edit the description.

Temenos - Property

17
Security User Guide

2. Click Save. The role is updated.

E.g.:

Deleteting a Role

To delete an existing role:

1. From the list, select the role:

Note: A role cannot be removed if is in use. Therefore, ensure that is not referenced
by any profiles before removing.

2. Click icon.

Temenos - Property

18
Security User Guide

3. You are asked to confirm the deletion.

E.g.:

Click Confirm. The selected role is deleted.

E.g.:

Temenos - Property

19
Security User Guide

Manage Mandators

In Security page, select Manage Mandators. The Manage Mandators page is displayed:

Note: Values for Country and Currency are loaded from the database. To limit unnecessary
load on the database, these values are not refreshed while working with mandators. When
values change, the user does not see the changes, until the whole page is opened again from
the Security module home page.

Creating a new Mandator

To create a new mandator:

1. Click Create new Mandator button. The following right panel is displayed:

2. Enter the Id :

E.g.:

Note: This field is mandatory. The Id is referenced in the interfaces of Rules


Manager, so the Id needs to be meaningful.

3. In Currency, select the currency:

Temenos - Property

20
Security User Guide

E.g.:

4. In Country, select the country:

E.g.:

5. In GMT Offset, select the time zone:

E.g.:

6. Enter a valid email address:

E.g.:

7. In Description, enter the mandator characteristics:

E.g.:

8. Click Save. The mandator is created.

E.g.:

Temenos - Property

21
Security User Guide

Editing a Mandator

To edit an existing mandator:

1. From the list, select the mandator.

E.g.: 001

Note: The Id field cannot be changed. The user can only edit the following:
- Currency
- Country
- GMT Offset
- Email
- Description
- Country
- Zone

2. Click Save. The selected mandator is updated.

E.g.: Changing the email address to test123@temenos.com

Deleting a Mandator

To delete an existing mandator:

1. From the list, select the mandator:

Temenos - Property

22
Security User Guide

2. Click icon.

3. You are asked to confirm the deletion:

E.g.:

Click Confirm to delete the mandator. The mandator is deleted.

E.g.:

Temenos - Property

23
Security User Guide

Note: If is used, a mandator cannot be removed. Therefore, ensure that mandator is not
referenced by any profiles before removing.

Temenos - Property

24
Security User Guide

Manage References

This section describes how to manage the Zones, Countries and Currencies that are used
throughout the FCM Suite.
In Security page, select Manage References. The Manage References page is displayed:

The page is divided in three main sections:


- Zones;
- Country;
- Currencies.

Temenos - Property

25
Security User Guide

Zones
This sections describes how to create, edit, and delete a zone.
The Zones page is displayed:

Creating a new Zone

To create a new zone:

1. Click on Create New Zone button. The following below panel is displayed:

2. Enter the Id:

E.g.:

Temenos - Property

26
Security User Guide

Note: This field is mandatory. The Id is referenced in the interfaces of Rules


Manager, so the Id needs to be meaningful.

3. Enter the Name:

E.g.:

4. In Description enter the zone characteristics.

E.g.:

5. Click Save. A new zone is created.

E.g.:

Temenos - Property

27
Security User Guide

Editing a Zone

To edit a role:

1. From the list, select the zone.

E.g.: ALLin

Note: The Id filed cannot be changed. The user can only edit the following:
- Name
- Description

2. Click Save.

E.g.: Changing the name in ALLin123

The selected zone is updated.

E.g.:

Temenos - Property

28
Security User Guide

Deleting a Zone

To delete an existing zone:

1. From the list, select the zone.

Temenos - Property

29
Security User Guide

Note: If is in use, the zone cannot be deleted.

2. Click icon.

3. You are asked to confirm the deletion.

E.g.:

Click Confirm to delete the role. The zone is deleted.


E.g.:

Temenos - Property

30
Security User Guide

Countries

This sections describes how to create, edit, and delete a country.


The Countries page is displayed:

Creating a new Country

To create a new country:

1. Click Create New Country button. The following below panel is displayed:

Temenos - Property

31
Security User Guide

2. Complete the country details: Code, Code3, Name, and Numeric Code.

E.g.: new country Bosnia test

Temenos - Property

32
Security User Guide

3. Click Save. A new country is created:

E.g.:

Editing a Country

To edit a role:

1. Select the country that you want edited.

E.g.: Bosnia test

Note: The Id filed cannot be changed. You can only edit:

- Code3
- Name
- Numeric Code

2. Click Save. The country is updated.

Deleting a Country

To delete an existing country:

1. From the list, select the country:

Temenos - Property

33
Security User Guide

2. Click icon.

3. You are asked to confirm the deletion.


E.g.:

Click Confirm. The country is deleted.

Temenos - Property

34
Security User Guide

Currency

The Currency page is displayed:

Creating a new Currency

To create a new currency:

1. Click Create New Currency button. The following below panel is displayed:

E.g.:

2. Enter the Code:

E.g.:

Note: This field is mandatory. The Id is referenced in the interfaces of Rules


Manager, so the Id needs to be meaningful.

3. Enter the name of the currency:

Temenos - Property

35
Security User Guide

E.g.:

4. Click Save. The new currency is created.


E.g.:

Edit a Currency

To edit a role:

1. From the list, select the role that you want edited.

E.g.:

Temenos - Property

36
Security User Guide

Note: The Code field cannot be changed. You can only edit the name of the
currency.

2. Click Save. The Currency is updated.

Deleting a Currency

To delete an existing currency:

1. From the list, select a currency.

E.g.:

Temenos - Property

37
Security User Guide

2. Click icon.

3. You are asked to confirm the deletion.

E.g.:

Click Confirm. The currency is deleted.

Temenos - Property

38
Security User Guide

Data export

The Security component exports all the data to CSV format. Each table that the Security
component operates on can be exported separately.

Export option is available next to the tables with data that can be exported:

E.g.:

The table below provides the list of entities, that can be exported along with exported data,
and table from database on which export is run.

Exported data

Temenos - Property

39
Security User Guide

Temenos - Property

40
Security User Guide

Acronyms & Glossary

Advanced Due Diligence A term used by risk and compliance officers, to describe the
process of a difficult investigation.
Alert An alarm or other signal of risk.

Black List These include lists of sanctioned entities: individuals,


companies, countries etc.

CIF Customer Information File

COFI Compliance Filter (Sanctions, Embargoes, ATF ...)

E
Enabled Indicates if the entry is enabled or not

F
FCM Financial Crime Mitigation

Mandator A mandatory is a single business unit that belongs to the


same group.

OFAC The Office of Foreign Assets Control of the United States

PEP Indicates if an entry is Politically Exposed Person or not

Temenos - Property

41
Security User Guide

Temenos - Property

42

You might also like