System Administration > Security

In addition to configuring core data items that are specific to your organization, you must configure settings that determine a variety of operational factors for your EMS installation, including user security settings. These settings determine the functions to which your users have access in your EMS installation.

You can access the security settings under System Administration > Security. You can then control security through user templates.

The following topics provide information about the security configuration features:

Plan Your Security Configuration

You can fine-tune security by configuring actions users should be allowed to take, information they can see, and rooms and buildings they can book. We recommend you configure security for EMS in the following phases: