LogoLogo
Ctrlk
Click to Submit Feedback!
  • Welcome to ASM HERMES!
  • ITSM Solutions
    • Example Solutions - Best Practices for a Successful Outcome
  • Use ASM
    • About the Alemba Service Manager Family
    • Using the Self Service Portal
    • Using Nano
    • Using ASM Core
  • SetUp & Configure ASM
    • Licensing
    • Installation and Patching
    • Setting Up your System
    • Configuring your System
      • Accessibility Features
      • ASM Solutions
      • Call Template Administration
      • Configuration Post Go-Live
      • Configuration Post Go-Live using SDLC
      • Configuring Escalations and Chase
      • Configuring the Data Purge Service
      • Configuring Screens
      • Conversation History Widget For Nano
      • Customizing Options for the Self Service Portal
      • System Administration Settings
        • Custom Global Profile Fields
        • System Settings Menu
        • Security
        • Security Roles
          • General Access Security Role
          • IPK Management Security Roles
          • Workflow Management Security Roles
          • Configuration Management Security Roles
          • Service Level Management Security Roles
          • Availability Management Security Roles
          • Knowledge Management Security Roles
          • Bulletin Board Security Roles
          • Dashboard Management Security Role
          • Integration Security Role
        • IPK and Workflow
        • Service Level Management
        • CMDB (Configuration Management Database)
        • Availability
        • Depreciation
        • Knowledge Bank
        • Bulletin Board
        • Text Retrieval
        • Analytics
        • Self Service Portal
        • Nano
        • Preview Features/Advanced Options
      • Workflow Template Administration
    • Dashboards and Reporting
    • FAQ
  • Integrate
    • Integration Overview
    • Managing Integration
    • API's
  • Earlier Versions of ASM
Powered by GitBook
On this page

Was this helpful?

  1. SetUp & Configure ASM
  2. Configuring your System
  3. System Administration Settings
  4. Security Roles

Integration Security Role

PreviousDashboard Management Security RoleNextIPK and Workflow

Was this helpful?