Security & Access Control
What You’ll Learn
In this module, you’ll explore how BigLedger keeps your data secure. You’ll see user management, role-based permissions, session controls, and complete audit trails of all activities.
Before You Begin: Key Terms Explained
| Term | What It Means |
|---|---|
| User | Someone who logs into the system |
| Role | A set of permissions (e.g., “Finance Officer” can do X, Y, Z) |
| Permission | The ability to do something (view, create, edit, delete, approve) |
| Session Timeout | Automatic logout after a period of inactivity |
| Audit Trail | A log of who did what and when |
| Maker-Checker | One person creates, another approves |
Why This Module Matters
Security is critical because:
- Data protection - Only authorized people access sensitive information
- Accountability - Know who did what and when
- Compliance - Meet government security requirements
- Fraud prevention - Separation of duties and approvals
Test Scenario 1: User Management
Objective: See how users are managed
Time: 3 minutes
Step-by-Step Instructions
Navigate to: Admin → User Management → Users
View the list of users
Click on any user to see their profile
What You’ll See
| Tab | Information |
|---|---|
| Profile | Name, email, department, status |
| Roles | Assigned roles and permissions |
| Security | Password policy, expiry date |
| History | Login history, last access |
Try This
- Look at the different roles assigned
- See when the user last logged in
- Check if there’s an expiry date set
Test Scenario 2: Role-Based Permissions
Objective: Understand how permissions work
Time: 3 minutes
Step-by-Step Instructions
Navigate to: Admin → User Management → Roles
View the list of roles (e.g., Finance Officer, Finance Manager)
Click on any role to see its permissions
What You’ll See
| Permission Area | Available Actions |
|---|---|
| Menu Access | Which modules the role can see |
| Data Access | Which departments/PTJs visible |
| Function Access | View, Create, Edit, Delete, Approve |
| Amount Limits | Approval thresholds |
Example: Finance Officer vs Finance Manager
| Action | Finance Officer | Finance Manager |
|---|---|---|
| Create Invoice | Yes | Yes |
| Approve Invoice | No | Yes |
| View Reports | Limited | Full |
| Manage Users | No | No |
Test Scenario 3: Session Timeout (Auto-Logout)
Objective: Verify automatic logout for inactive users
Time: 3 minutes
Step-by-Step Instructions
Navigate to: Admin → System Settings → Security
View the session timeout settings
Observe:
Setting Purpose Timeout Period How long before logout (e.g., 30 minutes) Warning Time When to show warning (e.g., 5 minutes before) Action What happens (logout, save draft)
What Happens When You’re Inactive
- Warning message appears 5 minutes before timeout
- Option to extend session
- If no response, automatic logout
- Redirected to login page
- Event logged in audit trail
Test Scenario 4: Last Access Information
Objective: See when and where a user last logged in
Time: 2 minutes
Step-by-Step Instructions
Login to the system
Look at the dashboard or user profile
Find the last access information
What You’ll See
| Information | Purpose |
|---|---|
| Last Login Date | When you previously logged in |
| Last Login Time | What time |
| IP Address | Where from (for suspicious activity) |
| Failed Attempts | Any recent failed logins |
Test Scenario 5: Audit Trail
Objective: See the complete activity log
Time: 5 minutes
Step-by-Step Instructions
Navigate to: Admin → Audit Trail
Search for activities:
Filter Example Date Range Last 7 days User Specific user or all Module Finance, Sales, etc. Action Create, Edit, Delete, Approve View the results
What You’ll See
| Column | Information |
|---|---|
| Timestamp | Exact date and time |
| User | Who performed the action |
| Action | What they did |
| Module | Where they did it |
| Details | Before/after values, document reference |
| IP Address | Where they were |
Try This
- Search for all “Delete” actions
- Filter by a specific user
- Look at “before and after” values for edits
- Export the audit trail
Test Scenario 6: Password Policy
Objective: See password security settings
Time: 2 minutes
Step-by-Step Instructions
Navigate to: Admin → System Settings → Password Policy
View the settings
What You’ll See
| Policy | Setting |
|---|---|
| Minimum Length | 8+ characters |
| Complexity | Requires uppercase, lowercase, number, special |
| Expiry | Password must change every X days |
| History | Can’t reuse last X passwords |
| Lockout | Account locks after X failed attempts |
Why This Matters
Strong password policies prevent unauthorized access and meet security compliance requirements.
Your Progress Checklist
Mark off what you’ve completed:
| Scenario | Status |
|---|---|
| 1. Explored user management | ⬜ |
| 2. Reviewed role-based permissions | ⬜ |
| 3. Checked session timeout settings | ⬜ |
| 4. Viewed last access information | ⬜ |
| 5. Searched audit trail | ⬜ |
| 6. Reviewed password policy | ⬜ |
Key Takeaways
After completing this module, you’ve seen that BigLedger:
| UTM Requirement | How BigLedger Meets It |
|---|---|
| 9.15a User ID Expiry | Set expiration dates for user accounts |
| 9.15b Auto Logout | Configurable session timeout |
| 9.15c Last Access | Display login history |
| RBAC | Granular role-based access control |
| Audit Trail | Complete activity logging |
| Password Policy | Strong password enforcement |
Additional Security Features
BigLedger also provides:
| Feature | Description |
|---|---|
| Encryption | AES-256 for data at rest, TLS 1.3 in transit |
| Two-Factor Auth | Optional 2FA for sensitive operations |
| IP Restrictions | Limit access by IP address |
| SSO Integration | Connect to MyUTM portal |
| Security Reports | Login activity, failed attempts, etc. |
Quick Reference: Navigation
| What You Want to Do | Where to Find It |
|---|---|
| Manage users | Admin → User Management → Users |
| Manage roles | Admin → User Management → Roles |
| View audit trail | Admin → Audit Trail |
| Security settings | Admin → System Settings → Security |
| Password policy | Admin → System Settings → Password Policy |
What’s Next?
You’ve completed the Security & Access Control evaluation. Choose your next module:
Questions?
If anything wasn’t clear or you’d like a live demonstration:
- Demo Coordinator: fatimah@bigledger.com
- Technical Support: support@bigledger.com