Security designer – BUCHI NIRWare User Manual
Page 11

NIRWare 1.5 Software Manual
Introduction
5
Life Cycle Templates
Different Life Cycle Templates can be selected for configuration. In order to simplify the use of the
lifecycle model there are three pre-defined lifecycle model templates: Unregulated, ER (Electronic
Records), and ERES (Electronic Records/Electronic Signatures), which cover different
requirements. The lifecycle involves all software modules, applications and calibrations.
NIRWare Configuration
In NIRWare Configuration, the IP address of the connected device and the database server to
which NIRWare connects are specified. In addition, installed language packages can be activated
and a reset of the grid configuration can be performed here.
Database Maintenance
Backup of the database and restore of previous backup files can be performed externally in the
BUCHI Database Manager (BDM). An Archive function is available.
Customer Information
Company name and address can be entered. This information will be shown in the header of result
reports.
Import / Export
The possibility of efficient and easy data exchange is highly significant. The import and export
functions of the Administrative Tools offer the required and direct options.
Applications, calibrations and samples can be exported from the database to an XML-File.
Applications, calibrations and samples previously exported as an XML-File can be imported to the
database.
For the selection different filter functions are available.
2.1.4. Security Designer
Especially in regulated environments, authorizations for access to the software or to individual software
modules must be precisely defined. A basic precondition for this task is an integrated user management
system.
Users and user groups
Access authorizations may be assigned exclusively to users and user groups registered in the
integrated user management system. For this purpose, you can create and manage users and user
groups with individual rights.
Security policies
All software components, including applications, can be fully protected against unauthorized
access.
Account Policy
With the aid of the Account Policy, the rules are defined for user names and passwords. For
example, it is possible to define the minimum length of the user name as well as the complexity