You are here: Administrator Help > System Administration Security

System Administration Security

JustWare System Administration allows administrators to configure and maintain JustWare's security features to adhere to office requirements.

JustWare allows the safe, convenient storage of information about people and cases in one easily-accessible location. In order to maintain data integrity and security, JustWare uses several trusted security protocols to ensure that your data is accessible only by recognized users that you designate.

JustWare uses Microsoft-approved DPAPI for client-side security, which encrypts data using a master key. With Roaming Profiles, DPAPI still protects the data even when a user logs on to a different computer on the network, providing flexibility in a consistently secure environment. See "Security and DPAPI" for more information.

Data Partitioning provides added security by allowing you to control which agencies or users have access to specific types of data. For example, you could enable a certain group of users to view name records but not contact information contained in those name records. See "Data Partitioning" for more information.

Security Profiles enable you to dictate which information a user can access and what they can do with that data. For example, you could specify that a certain group of users be enabled to view records but not create, modify or delete them. See "Security Profiles" for more information.

Topics in this section:

Topic Description
Security and DPAPI Information about the Data Protection Application Programming Interface (DPAPI).
Agency Code Table Information about the Agency Code Table and where it is used in JustWare.
Agency Persons Code Table Information about the Agency Persons Code Table and where it is used in JustWare.
Application Person Code Table Information about the Application Person Code Table and where it is used in JustWare.
Data Partitioning How to use data partitioning to control access to case and name information based on security profile or agency.
Security Profiles How to establish security profiles to restrict what user roles can perform.
Database Logging Information about database logging and when it occurs.
Tracking User Logons/Logoffs How to monitor when and how users are accessing JustWare.