Table of Contents
- Maintaining System Security
- General Security Considerations
- Introduction to Security Center
-
- Overview of Security Center
- Locum SafeSurvey Client
- Locum SecureAudit Client
- Locum RealTime Config
- Role-Based Access Control
- Operation of Security Center
- Security Center Guard File
- Troubleshooting Connection and Access Problems
- Installing Security Center
- Migrating and Upgrading Security Center
- Key Manager Library
- Support for Role-Based Access Control in the Application Environment
- Defining a User with Standard Usercode Attributes
- Security Configuration Best Practices
This section discusses the methods a security administrator can use to accomplish the following objectives:
-
Maintaining system security
-
Using Security Center
-
Using standard usercode attributes
See Installation Best Practices for more information on setting the system SECADMIN option and other system security options.
To configure a new system for a secure operation, see Initial Security Configuration Best Practices.

