Configure Security Checkpoints for NCR

Explanation

The purpose of security checkpoints is to provide extra security in a specific function, method or business flow. With an activated security checkpoint on a function the current user will have to re-authenticate in order to fulfill the function. Additionally, whenever a security checkpoint is successfully passed a security checkpoint log is written, creating an audit trail of what was done.

Security checkpoints can be configured for the following activities of the non conformance report (NCR) correction line:

You can activate and deactivate security checkpoints individually, but security checkpoints can also be activated and deactivated on a system level. To activate/deactivate a security checkpoint individually click View Legacy Checkpoints, select the specific checkpoint and click Activate/Deactivate.

Prerequisites

Only a system administrator can access and configure the security checkpoints.

System Effects