Configure Security Checkpoints for Shop Order

Explanation

The purpose of security checkpoints is to provide extra security in a specific function, method or business flow. With an activated security checkpoint on a function the current user will have to re-authenticate in order to fulfill the function. Additionally, whenever a security checkpoint is successfully passed a security checkpoint log is written, creating an audit trail of what was done.

Security checkpoints can be configured for the following activities of the shop orders:

You can activate and deactivate security checkpoints individually, but security checkpoints can also be activated and deactivated on a system level.

Prerequisites

Only a system administrator can access and configure the security checkpoints.

System Effects