Fleet Management Logo
Site Search
Advance Search
What's New
Events/Tradeshows
  • Nov 08, 2008 - Nov 12, 2008
  • IACP Conference/Exhibit Convention Center San Diego, CA
  • Click Here »
    For Fleet Tradeshows
Fleet ManagementVehicle and Vehicle Component RemanufacturingVehicle Upfitting

 Security Image Security Video

Security

User Level Security

User level security is based on user name and password which are entered at login.

Administrative Security

Locations (groups), menus, privileges, report groups and printers can be assigned as user specific or role based. User names and permissions are assigned in a database table.

Server Operating System and Network Security

Security, when accessing Vehicle Management Information System (VMIS), is enforced at three levels, Internet/Server Operating System, Application and Database.

The initial security level is controlled through the firewall into the server operating system. The VMIS Application employs Microsoft Windows Server Security features as part of the overall Security Framework. Upon successful firewall passage, the user is typically brought into the application security module with the user-ID passed to VMIS for further application authorization.

Database Security

VMIS utilizes the Oracle and SQL Server Relational Databases. VMIS leverages the security features of each respective database. Database security features employed by VMIS include; database rules, roles and virtual private database functions.

Application Security

Within the VMIS Application, security is enforced at four levels, location, field level, page level and menu level. User access definitions related to each of these levels is defined through the use of security templates. Templates can be defined at a user level or group level.

VMIS provides a Windows File Manager style menu system, where users are presented folders that contain the programs that they are authorized to access. Integrated into the menu component of the system is the capability to define the authorization level of the user by page; granting full, update or read only access. The same authorization levels (full, update, read only) can be applied at the Field Level. When Field level authorizations are invoked they override the page level template parameters. Within each security level the system also provides “privileges” for functions within programs such as canceling records, exceeding work order limits or changing downtime information.

Users are also granted authorization to system processing by location. Users can be granted access to a single location, multiple locations, range of locations or all locations. Users are limited access to only those locations for which they are authorized. Location definitions can be assigned at a group or user level.

Customer Service    Public Notices    Privacy    SiteMap