Security designer – BUCHI NIRWare User Manual

Page 11

Advertising
background image

NIRWare 1.5 Software Manual

Introduction

5

Life Cycle Templates

Different Life Cycle Templates can be selected for configuration. In order to simplify the use of the
lifecycle model there are three pre-defined lifecycle model templates: Unregulated, ER (Electronic
Records), and ERES (Electronic Records/Electronic Signatures), which cover different
requirements. The lifecycle involves all software modules, applications and calibrations.

NIRWare Configuration

In NIRWare Configuration, the IP address of the connected device and the database server to
which NIRWare connects are specified. In addition, installed language packages can be activated
and a reset of the grid configuration can be performed here.

Database Maintenance

Backup of the database and restore of previous backup files can be performed externally in the
BUCHI Database Manager (BDM). An Archive function is available.

Customer Information

Company name and address can be entered. This information will be shown in the header of result
reports.

Import / Export

The possibility of efficient and easy data exchange is highly significant. The import and export
functions of the Administrative Tools offer the required and direct options.

Applications, calibrations and samples can be exported from the database to an XML-File.

Applications, calibrations and samples previously exported as an XML-File can be imported to the
database.

For the selection different filter functions are available.

2.1.4. Security Designer

Especially in regulated environments, authorizations for access to the software or to individual software
modules must be precisely defined. A basic precondition for this task is an integrated user management
system.

Users and user groups
Access authorizations may be assigned exclusively to users and user groups registered in the
integrated user management system. For this purpose, you can create and manage users and user
groups with individual rights.

Security policies

All software components, including applications, can be fully protected against unauthorized
access.

Account Policy

With the aid of the Account Policy, the rules are defined for user names and passwords. For
example, it is possible to define the minimum length of the user name as well as the complexity

Advertising