Security
User’s Guide
FCM Suite document
Security User Guide
0.2 Version (January 2016)
Internet
Visit our home page: http://www.temenos.com
Temenos Company
2 Rue de l’Ecole-de-Chimie
CH - 1205 Geneva
Switzerland
The information presented is subject to change without notice. Temenos assumes no
responsibility for inaccuracies contained herein.
© Copyright Temenos Headquarters 2007, 2016. All rights reserved.
This product contains computer software documentation which is the property of Temenos.
The information must not be made available to, or copied or used by anyone outside
Temenos without its written authorization.
Not to be used or disclosed except in accordance with applicable agreements.
Temenos - Property
2
Security User Guide
Table of Contents
Chapter1. About This Publication .............................................................................................. 5
Related information ................................................................................................................ 5
Document pertinence ............................................................................................................. 5
Audience ................................................................................................................................ 5
Special Conventions .............................................................................................................. 6
Summary of Changes ............................................................................................................ 6
Introduction to Security Module ............................................................................................. 6
Chapter2. Getting Started with Security Module ....................................................................... 8
Chapter3. Manage Users .......................................................................................................... 9
Users ...................................................................................................................................... 9
Creating a new User ........................................................................................................... 9
Deleting a User ................................................................................................................. 10
Profiles ................................................................................................................................. 12
Creating a new Profile ...................................................................................................... 12
Editing a Profile ................................................................................................................ 13
Deleting a Profile .............................................................................................................. 14
Manage Roles .......................................................................................................................... 16
Creating a new Role............................................................................................................. 16
Editing a Role ....................................................................................................................... 17
Deleteting a Role .................................................................................................................. 18
Manage Mandators .................................................................................................................. 20
Creating a new Mandator ..................................................................................................... 20
Editing a Mandator ............................................................................................................... 22
Deleting a Mandator ............................................................................................................. 22
Manage References ................................................................................................................ 25
Zones ................................................................................................................................... 26
Creating a new Zone ........................................................................................................ 26
Editing a Zone .................................................................................................................. 28
Deleting a Zone ................................................................................................................ 29
Countries .............................................................................................................................. 31
Creating a new Country.................................................................................................... 31
Edit a Country ................................................................................................................... 33
Deleting a Country ............................................................................................................ 33
Currency ........................................................................................................................... 35
Creating a new Currency.................................................................................................. 35
Edit a Currency ................................................................................................................. 36
Deleting a Currency .......................................................................................................... 37
Data export .............................................................................................................................. 39
Temenos - Property
3
Security User Guide
Acronyms & Glossary .............................................................................................................. 41
HEADQUARTERS SA.
COPYRIGHT 2007 - 2010 TEMENOS HEADQUARTERS SA. All rights reserved.
Temenos - Property
4
Security User Guide
Chapter1. About This Publication
This publication describes the Security Module application that is a component of the FCM
Suite solution. The Security Module is a high performance user interface that configures the
user access and segregation.
The purpose of this guide is to help Security Module users to manage:
- Users;
- Profiles;
- Mandators;
- Zones;
- Countries;
- Currencies.
Related information
For information about Temenos products, see: Temenos Company Web site
(http://www.temenos.com)
For information about related products, see:
Alert Manager User’s Guide;
Profiling User’s Guide;
Rule Manager User’s Guide;
Reports User’s Guide;
Security User’s Guide;
KC+ User’s Guide;
Watch List Manager User’s Guide;
Web Inquiry User’s Guide;
Application Run Manual;
Rule Editor User’s Guide.
Document pertinence
This document applies to the FCM Suite projects.
Audience
This guide is intended for engineers responsible for day-to-day optimization of the application.
Temenos - Property
5
Security User Guide
Special Conventions
Conventions used in this guide:
Convention Meaning
Bold - Object of an action: menu names, field names, options, button names
- Commands typed at a prompt
- User input
Italic - Names of books, chapters and sections as references
- Emphasis
Monospace - Directories and subdirectories
- File names and extensions
- Process names
- Code sample, including keywords and variables within text and as separate paragraphs,
and user-defined program elements within text
<Variable> - Substitute input value
Summary of Changes
This publication contains additions and changes to information previously presented in
Security Module User's Guide.
General changes -
New information -
Changed information -
Deleted information -
Introduction to Security Module
The FCM Suite system is designed to scan messages made across international borders. The
system is verifying if the payer, payee, and the payment narrative are subject to one, or more
of the following criteria:
- Watch lists of individuals or entities to which sanctions apply.
- Payments made from/to countries listed on the Financial Action Task Force on Money
Laundering’s Non-Compliant Countries or Territories list.
- Payments made to individuals or entities listed on the Office of Foreign Assets (OFAC)
register.
The Security module is part of FCM Suite, being a software solution that screens large
volumes of payments quickly and accurately.
First authentication of the users is done by the application server. Information about proper
configuration of the application server is included in the installation guides.
The access to each module is controlled through the Security module, and by the rules
defined in Rule Manager.
Each user that accesses FCM Suite must be registered within the Security module. It is
possible to define any number of profiles in Security module, and each user need to be
assigned to one of them.
Each profile has a set of roles for different mandators:
Temenos - Property
6
Security User Guide
User 1 User 2 User 3
Profile 1 Profile 2
Mandator 2
Mandator 1
Mandator 2
Mandator 1
Mandator1
Mandator1
Role 1:
Role 2:
Role 2:
Role 3:
Role1:
Role1:
For more information about the Rule Manager application, and the mechanism on which the
user access rights are calculated, refer to Rule Manager User Guide.
Temenos - Property
7
Security User Guide
Chapter2. Getting Started with Security Module
This section describes how to initialize and perform simple tasks using Security Module.
To access the Security Module:
1. Access the following URL, using a web browser:
http://hostname:port/vrisk/app/
Where:
- hostname: the host or the IP address of the server containing the FCM Suite
applications;
- port: the TCP port number listening to HTTP requests.
Note: You need to contact the system administrator for the values that apply to
your organisation.
2. Log in the application by typing your user name and password.
3. Click OK to start the application.
4. In FCM Suite home page, select one of Security submenu.
The user can select the part of the application that want managed:
- Manage Users;
- Manage Roles;
- Manage Mandators;
- Manage References.
Note: The access of different Security component modules depends on the rules for the
Security module, and the user profile.
Temenos - Property
8
Security User Guide
Chapter3. Manage Users
In Security page, select Manage Users.
The Manage Users is displayed:
Users
This section describes how to manage the users.
Creating a new User
To create a user:
1. Click Create User button. The following page is displayed :
2. In User, enter the name:
E.g.:
3. In Profile, select the user profile:
Temenos - Property
9
Security User Guide
E.g.:
4. Click Save. The user is created. Default user password is change123Me.
E.g.:
Note: To find a user, type the name in Search User field and press Enter.
E.g.:
Deleting a User
To delete an existing user:
1. From the list, select a user.
Temenos - Property
10
Security User Guide
2. Click Delete.
E.g.:
3. You are asked to confirm the deletion :
E.g.:
Click Confirm. The selected user is deleted.
Temenos - Property
11
Security User Guide
Profiles
This section describes how to manage the profiles.
Examples of profiles:
Creating a new Profile
A profile is a collection of capabilities associated with a mandator. One profile is associated to
each user.
To create a new profile:
1. Click on Create Profile. The following right panel is displayed:
Temenos - Property
12
Security User Guide
2. In Profile details, enter the Id and Description of the profile.
E.g.:
Note: When a new profile is created, the user can only add the Id and the description.
3. Click Save. The new profile is created.
E.g.:
Editing a Profile
To edit an existing profile:
1. From the list, select the profile.
Temenos - Property
13
Security User Guide
E.g.: For Evaluator1 profile, the Description field is changed:
Instead of Alert evaluator, add Alert evaluator – Test:
Note: The Id filed cannot be changed. The user can only edit the following:
- Description;
- Role;
- Mandator.
2. Click Save. The profile is updated.
E.g.:
The roles are only added in pair with Mandator. There is no possibility to add a role that
applies for all mandators. If you add a role with mandator ALL, then you can only access the
items that have mandator ALL, and no other mandators.
E.g.: public entries in the Watch List Manager, but not entries of private lists.
Note: In some cases the mandator value is not important for roles. For more information refer
to Rule Manager User Guide.
Deleting a Profile
To delete an existing profile:
1. From the list, select the profile.
Temenos - Property
14
Security User Guide
E.g.:
2. Click Delete.
Note: A profile is removed if no users are assigned to it. If it is not the case, warning
is displayed.
3. You are asked to confirm the deletion.
E.g.:
Click Confirm. The selected profile is deleted.
Note: To delete a profile you do not need a confirmation from the user.
Temenos - Property
15
Security User Guide
Manage Roles
In Security page, select Manage Roles and click. The Manage Roles page is displayed:
Creating a new Role
To create a new role:
1. Click Create new Role button. The following right panel is displayed:
2. Enter the Id:
E.g.:
Temenos - Property
16
Security User Guide
Note: This field is mandatory. The ID is referenced in the interfaces of Rules
Manager, so the Id needs to be valid.
3. In Description, enter the role characteristics.
E.g.:
4. Click Save. The role is created.
E.g.:
Note: If you create a role that has the same details or name, the following information
is displayed:
Editing a Role
To edit an existing role:
1. From the list, select the role.
E.g.: PRO_REPORT1
Note: The Id field cannot be changed. The user can only edit the description.
Temenos - Property
17
Security User Guide
2. Click Save. The role is updated.
E.g.:
Deleteting a Role
To delete an existing role:
1. From the list, select the role:
Note: A role cannot be removed if is in use. Therefore, ensure that is not referenced
by any profiles before removing.
2. Click icon.
Temenos - Property
18
Security User Guide
3. You are asked to confirm the deletion.
E.g.:
Click Confirm. The selected role is deleted.
E.g.:
Temenos - Property
19
Security User Guide
Manage Mandators
In Security page, select Manage Mandators. The Manage Mandators page is displayed:
Note: Values for Country and Currency are loaded from the database. To limit unnecessary
load on the database, these values are not refreshed while working with mandators. When
values change, the user does not see the changes, until the whole page is opened again from
the Security module home page.
Creating a new Mandator
To create a new mandator:
1. Click Create new Mandator button. The following right panel is displayed:
2. Enter the Id :
E.g.:
Note: This field is mandatory. The Id is referenced in the interfaces of Rules
Manager, so the Id needs to be meaningful.
3. In Currency, select the currency:
Temenos - Property
20
Security User Guide
E.g.:
4. In Country, select the country:
E.g.:
5. In GMT Offset, select the time zone:
E.g.:
6. Enter a valid email address:
E.g.:
7. In Description, enter the mandator characteristics:
E.g.:
8. Click Save. The mandator is created.
E.g.:
Temenos - Property
21
Security User Guide
Editing a Mandator
To edit an existing mandator:
1. From the list, select the mandator.
E.g.: 001
Note: The Id field cannot be changed. The user can only edit the following:
- Currency
- Country
- GMT Offset
- Email
- Description
- Country
- Zone
2. Click Save. The selected mandator is updated.
E.g.: Changing the email address to test123@temenos.com
Deleting a Mandator
To delete an existing mandator:
1. From the list, select the mandator:
Temenos - Property
22
Security User Guide
2. Click icon.
3. You are asked to confirm the deletion:
E.g.:
Click Confirm to delete the mandator. The mandator is deleted.
E.g.:
Temenos - Property
23
Security User Guide
Note: If is used, a mandator cannot be removed. Therefore, ensure that mandator is not
referenced by any profiles before removing.
Temenos - Property
24
Security User Guide
Manage References
This section describes how to manage the Zones, Countries and Currencies that are used
throughout the FCM Suite.
In Security page, select Manage References. The Manage References page is displayed:
The page is divided in three main sections:
- Zones;
- Country;
- Currencies.
Temenos - Property
25
Security User Guide
Zones
This sections describes how to create, edit, and delete a zone.
The Zones page is displayed:
Creating a new Zone
To create a new zone:
1. Click on Create New Zone button. The following below panel is displayed:
2. Enter the Id:
E.g.:
Temenos - Property
26
Security User Guide
Note: This field is mandatory. The Id is referenced in the interfaces of Rules
Manager, so the Id needs to be meaningful.
3. Enter the Name:
E.g.:
4. In Description enter the zone characteristics.
E.g.:
5. Click Save. A new zone is created.
E.g.:
Temenos - Property
27
Security User Guide
Editing a Zone
To edit a role:
1. From the list, select the zone.
E.g.: ALLin
Note: The Id filed cannot be changed. The user can only edit the following:
- Name
- Description
2. Click Save.
E.g.: Changing the name in ALLin123
The selected zone is updated.
E.g.:
Temenos - Property
28
Security User Guide
Deleting a Zone
To delete an existing zone:
1. From the list, select the zone.
Temenos - Property
29
Security User Guide
Note: If is in use, the zone cannot be deleted.
2. Click icon.
3. You are asked to confirm the deletion.
E.g.:
Click Confirm to delete the role. The zone is deleted.
E.g.:
Temenos - Property
30
Security User Guide
Countries
This sections describes how to create, edit, and delete a country.
The Countries page is displayed:
Creating a new Country
To create a new country:
1. Click Create New Country button. The following below panel is displayed:
Temenos - Property
31
Security User Guide
2. Complete the country details: Code, Code3, Name, and Numeric Code.
E.g.: new country Bosnia test
Temenos - Property
32
Security User Guide
3. Click Save. A new country is created:
E.g.:
Editing a Country
To edit a role:
1. Select the country that you want edited.
E.g.: Bosnia test
Note: The Id filed cannot be changed. You can only edit:
- Code3
- Name
- Numeric Code
2. Click Save. The country is updated.
Deleting a Country
To delete an existing country:
1. From the list, select the country:
Temenos - Property
33
Security User Guide
2. Click icon.
3. You are asked to confirm the deletion.
E.g.:
Click Confirm. The country is deleted.
Temenos - Property
34
Security User Guide
Currency
The Currency page is displayed:
Creating a new Currency
To create a new currency:
1. Click Create New Currency button. The following below panel is displayed:
E.g.:
2. Enter the Code:
E.g.:
Note: This field is mandatory. The Id is referenced in the interfaces of Rules
Manager, so the Id needs to be meaningful.
3. Enter the name of the currency:
Temenos - Property
35
Security User Guide
E.g.:
4. Click Save. The new currency is created.
E.g.:
Edit a Currency
To edit a role:
1. From the list, select the role that you want edited.
E.g.:
Temenos - Property
36
Security User Guide
Note: The Code field cannot be changed. You can only edit the name of the
currency.
2. Click Save. The Currency is updated.
Deleting a Currency
To delete an existing currency:
1. From the list, select a currency.
E.g.:
Temenos - Property
37
Security User Guide
2. Click icon.
3. You are asked to confirm the deletion.
E.g.:
Click Confirm. The currency is deleted.
Temenos - Property
38
Security User Guide
Data export
The Security component exports all the data to CSV format. Each table that the Security
component operates on can be exported separately.
Export option is available next to the tables with data that can be exported:
E.g.:
The table below provides the list of entities, that can be exported along with exported data,
and table from database on which export is run.
Exported data
Temenos - Property
39
Security User Guide
Temenos - Property
40
Security User Guide
Acronyms & Glossary
Advanced Due Diligence A term used by risk and compliance officers, to describe the
process of a difficult investigation.
Alert An alarm or other signal of risk.
Black List These include lists of sanctioned entities: individuals,
companies, countries etc.
CIF Customer Information File
COFI Compliance Filter (Sanctions, Embargoes, ATF ...)
E
Enabled Indicates if the entry is enabled or not
F
FCM Financial Crime Mitigation
Mandator A mandatory is a single business unit that belongs to the
same group.
OFAC The Office of Foreign Assets Control of the United States
PEP Indicates if an entry is Politically Exposed Person or not
Temenos - Property
41
Security User Guide
Temenos - Property
42