Defining Users and Configuring Security
Defining Users and Configuring Security
The software that the bank uses must be able to control what an employee can and
cannot do once logged on. You are going to learn how this is done in T24.
CACHE EXPIRY : This field specifies the time interval in seconds before the cache file
refreshes.
If a user crosses the number of password attempts or if the user forgets the password,
these can be set in the following fields:
User Attempt : Every user is given a specific number of password attempts after which
the user account gets locked. Maximum number of password attempts is specified in
the application USER. Such locked user accounts can be unlocked by giving the user
name in the field User Attempt.
What if an administrator wants to activate a profile of an user even before the end of
the deactivation period? You can achieve this by setting the following field.
User Deact Perd : Specifies the ID of the user for whom the security administrator
wants to reactivate the profile before the end of the deactivation period.
User Reset : This field has the ID of a user whose password is to be reset.
User Password : A new password must be set in this associated field. This password