The purpose of security checkpoints is to provide extra security in a specific function, method or business flow. With an activated security checkpoint on a function the current user will have to re-authenticate in order to fulfill the function. Additionally, whenever a security checkpoint is successfully passed a security checkpoint log is written, creating an audit trail of what was done.
Security checkpoints can be configured for the following activities of the corrective and preventive action (CAPA) action line:
You can activate and deactivate security checkpoints individually, but security checkpoints can also be activated and deactivated on a system level. To activate/deactivate a security checkpoint individually click View Legacy Checkpoints, select the specific checkpoint and click Activate/Deactivate.
Only a system administrator can access and configure the security checkpoints.