The purpose of security checkpoints is to provide extra security in a specific function, method or business flow. With an activated security checkpoint on a function the current user will have to re-authenticate in order to fulfill the function. Additionally, whenever a security checkpoint is successfully passed a security checkpoint log is written, creating an audit trail of what was done.
Security checkpoints can be configured for the following activities of the non conformance report (NCR) correction line:
You can activate and deactivate security checkpoints individually, but security checkpoints can also be activated and deactivated on a system level. To activate/deactivate a security checkpoint individually click View Legacy Checkpoints, select the specific checkpoint and click Activate/Deactivate.
Only a system administrator can access and configure the security checkpoints.