9700 Security Guide
9700 Security Guide
9700 3.x
Security Guide
In This Document
This document describes 9700’s security design, features that monitor
actions that employees take on the System, and features that restrict
employee access to the database, reports, and operational procedures.
Declarations......................................................................................... 2
Overview ............................................................................................. 3
Authentication ..................................................................................... 5
Authorization/Privileges...................................................................... 7
Encryption ........................................................................................... 50
Audit Trail ........................................................................................... 51
Security Maintenance.......................................................................... 56
Declarations
Warranties
Although the best efforts are made to ensure that the information in this document
is complete and correct, MICROS Systems, Inc. makes no warranty of any kind
with regard to this material, including but not limited to the implied warranties of
marketability and fitness for a particular purpose. Information in this guide is
subject to change without notice. No part of this guide may be reproduced or
transmitted in any form or by any means, electronic or mechanical, including
photocopying, recording, or information recording and retrieval systems, for any
purpose other than for personal use, without the express written permission of
MICROS Systems, Inc.
MICROS Systems, Inc. shall not be liable for errors contained herein or for
incidental or consequential damages in connection with the furnishing,
performance, or use of this guide.
Trademarks
Windows is a registered trademark of Microsoft Corporation.
FrameMaker is a registered trademark of Adobe Corporation.
Printing History
New editions of this guide incorporate new and changed material since the previous
edition. Minor corrections and updates may be incorporated into reprints of the
current edition without changing the publication date or the edition number.
2 MD0006-090
Overview
Overview
Security features in 9700 are divided into the following areas:
• Securing the client’s property with 9700 applications and database servers
• Setting up operating systems and database users with the following security
guidelines:
• No master password
What to Protect
• Permanent data stored on the 9700 database server: The database will contain
a mix of sensitive information (credit cards, employee social security
numbers, employee identification numbers), less sensitive data, configuration
information, and sales figures.
• Temporary data cache: Flat files on the workstation contain a cache of the
configuration data needed for the workstation to operate in offline mode and
store transaction data during operations. Transaction data can contain
sensitive information, such as credit card information.
• Data that is transmitted between the workstation and the server during normal
operations and during data playback.
• Retention of Credit Card detail is kept for 6 weeks in the CHECKS table and
purged automatically
4 MD0006-090
Authentication
Authentication
Overview
Authentication is the process of ensuring that people on both ends of the
connection are who they say they are. Applicable to not only the entity trying to
access a service, Authentication is also applicable to the entity providing the
service.
EMC Authentication
All users’ credentials of the 9700 System are stored in the central database.
Anyone who has access to the Enterprise Management Console (EMC) must
provide a login of a valid username/password. No two MICROS users can have
the same username.
MICROS Systems, Inc. mandates client sites maintain proper configuration and
adhere to privilege level restrictions based on a need-to-know basis. For security
purposes, each user’s activities are traced via Audit Trail.
To ensure strict access control of the 9700 application, always assign unique
usernames and complex passwords to each account. For more information, please
see the 9700 PABP Compliance document specific to the site’s software version.
Note The 9700 System does NOT use the Windows Login.
Workstation Authentication
User Authentication
A user must authenticate themselves through the workstation by signing in using a
unique employee ID number or an employee magnetic card.
6 MD0006-090
Authorization/Privileges
Authorization/Privileges
Overview
Setting Authorization/Privileges establishes strict access control, explicitly
enabling or restricting the ability to do something with a computer resource.
User access control for Employees Levels, a way of controlling how employees
can view other employee information, is defined within the EMC | Personnel |
Employees module.
User access control for 9700 System elements is defined within the EMC |
Personnel | Access Levels and Report Writer Access Levels modules.
User authorization/privileges are configured by Employee Class configured
within the EMC | Personnel | Employees module.
Workstations also have their own EMC privileges module, Hardware | Device
Table module.
Employee IDs
The Employee ID field consists of a ten-digit number that identifies the operator
when attempting to sign in to POS Operations on the User Workstation or when
attempting to clock in or out at the User Workstation.
Enabling
ID
Enter an ID number to be used to identify the employee on workstations.
If you wish to assign employee IDs from magnetic cards, you must do this
though UWS Procedures.
Employee Levels
The Employee Levels feature may be used to create up to nine levels of employee
access. Employees assigned to a specific Employee Level can only access (i.e.,
view or change) information about other employees whose own Employee Level
is equal to or higher than their own.
The 9700 System only displays information about employees who have an equal
or higher number.
This feature is used to create an Employee Level to control an employee’s ability
to:
8 MD0006-090
Authorization/Privileges
Usage
Access Progression
Employee Levels are progressive. That is, an employee with an Access Level
of 4 can use files or functions that are themselves assigned Access Levels of 4
through 8. Files with an Access Level of 4 may be opened by employees with
an Access Level of 0 through 4.
Enabling
Level
Navigate within the EMC to Personnel | Employees | Sort By Employee
and enter the access level of the employees that this employee is allowed
to access when performing privileged operations in the EMC, UWS
Reports, UWS Procedures, or Report Writer.
If this field is set to zero, access is unrestricted. If this field is not zero, the
employee is allowed to access other employees of a high-numbered level.
For example, Level 3 employees may perform any operations for which
they are privileges, only on employees with Levels 4 through 9.
Employees with Level 0 can access all employees.
10 MD0006-090
Authorization/Privileges
Employee Groups
This feature may be used to create up to 300 distinct groups of employees within
9700, whose members cannot access information about each other.
When a privileged employee performs any operations that involve other
employees, 9700 only displays information for other employees who have the
same Group number. Since Employee records reside on the Enterprise Level, this
feature can be used to isolate information access to a Property or a single Revenue
Center.
This feature is used to create an Employee Group to control an employee’s ability
to:
Usage
Example 1
In a large restaurant, Employee Groups are used to prevent General Managers
in the Catering Revenue Center from accessing information about employees,
including other Managers, in the Lounge Revenue Center.
Example 2
In an airport concessions complex that uses 9700 to manage multiple
Properties, this feature may be used to prevent employees in the Pizza Shop
from accessing information about employees in the Gift Shop.
Enabling
Group
Navigate within the EMC to Personnel | Employees | Sort by Employee and
enter the number of the group that this employee is allowed to access when
performing privileged options in the EMC, UWS Reports, UWS Procedures,
or Report Writer. If this field is zero, access is unrestricted. If this field is not
zero, the employee is allows to access other employees of an equal group
number.
12 MD0006-090
Authorization/Privileges
Access Levels
Description
The Access Levels module determines the access level required for an employee to
open and modify modules in the 9700 Configurator within the EMC. The lowest-
numbered levels are the most powerful. For example, if the access level required
to add or change records in the Cashiers file is 3, a user must have an access level
setting of 3, 2 or 1 in order to perform these functions. There are a total of nine
access levels, eight of which are user-defined. Access level 0, Master, is the
highest level in the System and allows employees access to every file, function,
and report. This level cannot be changed or deleted.
0 Highest Level
MASTER
2
S
LE
EL
4 through 8.
4
AC
Lowest Level
8
The fields contained on the remaining tabs, such as the Menu tab shown
below, determine the access level required to open each specific module
within the Configurator.
14 MD0006-090
Authorization/Privileges
Description
The Report Writer Access Levels module determines the access level required for
an employee to take and reset reports in 9700 Report Writer.
There are a total of nine access levels, eight of which are user-defined. Access
level 0, Master, is the highest level in the System and allows employees access to
every file, function, and report. This level cannot be changed or deleted.
Additional fields in this module determine the Access Level required to take each
specific report.
Employee Classes
Employee Classes allow you to group
employees according to the duties that
they perform, such as servers, bussers, Property
Manager
Expert
and cooks, then assign the same
privilege and option settings to all
employees in a particular class. For Cashier Server
example, the employee class Bartenders
EMPLOYEE
is privileged to use one-touch sign in CLASSES
keys. The default touchscreen (Bar
Bartender Cooks
Main) is programmed to display two
one-touch keys, one for each bartender
on duty. Without classes, you would Busser Retail
have to assign privileges to each
individual employee, which can be a
very repetitive and time consuming
task. Besides easing your workload, employee classes also allow you to generate
reports for specific kinds of employees based on the class they belong to.
When adding employees to the System, you must specify which class they belong
to. So, in order for the list of classes to be available when defining the employee,
you should create the employee classes first.
16 MD0006-090
Authorization/Privileges
Employees Class
If there are “special cases” among the staff who don’t fit any of the general
classes, create a class just for them. For example, Sheila usually works as a server,
but occasionally tends bar, and also fills in as a manager when necessary. She
needs to be able to perform the duties of all three of the employee classes (Server,
Bartender, or Manager). Create an employee class that combines the privileges
required to perform as either a bartender or a server and allows the access levels
required of a manager. Label this new class “Utility”, or perhaps “Sheila”, and
select it as her Employee Class in her Employee record only.
The number of classes that can be created is limited only by the size of system
memory. So, if you have several of these “special cases,” take comfort in knowing
that you can set up whatever you may need to handle the situation.
Class Privileges
They are a variety of privileges that can be assigned to each Employee Class.
When sorting by Class, you will see the eight tabs shown below, which contain the
option settings for each of these categories.
General Privileges
The General tab, shown below, contains options relating to timekeeping and
transaction privileges.
18 MD0006-090
Authorization/Privileges
Clock in at Rate 1
Select this option to allow employees associated with this class to Clock
in at Job Rate 1.
Authorize Clock In
Select this option to allow employees associated with this class to
authorize other employees to clock in.
20 MD0006-090
Authorization/Privileges
Enable this option to allow employees associated with this class to view
the detail posted by all team members on a special event check and to
authorize non-privileged employees to do so as well. If this option is
disabled, employees associated with this class can only view the detail
they have posted to the guest check.
22 MD0006-090
Authorization/Privileges
A closed check adjustment allows the user (if privileged to void Tender/
Media from a previous round) to adjust the Tender/Media or Service
Charge on a closed check.
24 MD0006-090
Authorization/Privileges
Printing Privileges
The Printing tab, shown below, contains options relating to guest check,
receipt, and tender media authorization privileges.
26 MD0006-090
Authorization/Privileges
28 MD0006-090
Authorization/Privileges
Utilities Privileges
The Utilities tab, shown below, contains options for access control to the
Control Panel, Credit Card Utilities, NetVupoint and Dataviewer utilities, and
other specific utilities.
30 MD0006-090
Authorization/Privileges
Login to Dataviewer
Select this option to allow employees in this class to log in to Dataviewer.
For information on the options located on the Privileges tab, please see
“Access Level Granted to an Employee Class” on page 15.
32 MD0006-090
Authorization/Privileges
34 MD0006-090
Authorization/Privileges
Transaction Privileges
The Transactions tab, shown below, contains options relating to posting
and authorization privileges for transactions, service charges, tender, and
other employee’s checks.
36 MD0006-090
Authorization/Privileges
38 MD0006-090
Authorization/Privileges
Miscellaneous Privileges
The Options tab, shown below, contains options for miscellaneous
authorization privileges, such as for Mobile Micros Handhelds (MMH),
Universal Stored Value Cards, and cash drawer usage.
40 MD0006-090
Authorization/Privileges
Note that the [Assign Cash Drawer] key does not require an Employee
class privilege—any employee with access to the [Assign Cash Drawer]
button can use it.
42 MD0006-090
Authorization/Privileges
44 MD0006-090
Authorization/Privileges
Workstation Privileges
Workstation Privileges are configured in the EMC within the System Hardware |
Device Table | <Select Workstation> | Options Tab.
Enabling
46 MD0006-090
Authorization/Privileges
Auto Begin Chk when Chk Optr ID/# Entered Outside of Trans.
This option is active only if the “Allow Replacement Sign In Outside
Transaction” option is disabled. Select this option to allow an operator to
begin a guest check transaction by entering an operator ID or employee
number. The signed-in operator becomes the transaction operator; the
employee whose ID or employee number was entered becomes the check
operator.
If this option is enabled, sales totals and tenders posting are determined
by the setting of the Revenue Center Parameters Posting options “Post
Totals to Transaction Operator” and “Post Tender to Transaction
Operator.” The system will require the use of either the employee ID or
the employee number, as determined by the setting of the Operator option
“Use Employee Number to Open Check for Another Employee.”
48 MD0006-090
Authorization/Privileges
Disable auto-online
A workstation will automatically return to Online Mode if
communications have been reestablished and the number of transactions
rung offline is less than the amount specified in the Property Parameters
“Automatic Online Transaction Limit” field. By enabling this option, the
workstation will prompt the user to return online, instead of continuing
online automatically.
Encryption
Overview
Encryption is the reversible transformation of data from the original (plaintext) to
a difficult-to-interpret format (ciphertext).
50 MD0006-090
Audit Trail
Audit Trail
Overview
The Audit Trail keeps a record of all changes made to the 9700 database, as well
as the identity of the employee who made the changes. The Audit Trail records the
following activity:
Enabling
The EMC | System Information | Parameters option Enable Audit Trail must be
enabled for Audit Trail to record activity. For security purposes, MICROS
Systems, Inc. mandates this option be enabled.
Usage
A privileged employee may conduct searches within the Audit Trail of database
changes based on a variety of search criteria (e.g., by application, by operation, or
by employee).
To authorize an employee to run the Audit Trail module, Search tab, the option
Run the Audit Trail Program must be enabled within the EMC Employees
module, see page 30 for more information (Personnel | Employees | Maintenance
| Sort by Class | Utilities tab).
The Audit Trail file must be reset (erased) periodically in order to prevent the file
from becoming very large and consuming too much space on the PC’s hard drive.
To authorize an employee to manual reset the Audit Trail, the Reset the Audit
Trail option must be enabled within the EMC Employees module (Personnel |
Employees | Maintenance | Sort by Class | Utilities tab), see page 30 for more
information. The Audit Trail is manually reset within the Audit Trail Search
module, see page 55 for more information.
52 MD0006-090
Audit Trail
The results of an Audit Trail Report can be viewed on the PC Monitor, printed
to the PC’s network printer, or saved to a file on the PC.
Audit Trail reports may be taken for:
• Each application
Enabling
Applications
Select the application to be included in the search.
Operations
Select the operation to be included in the search.
Module
Select the module to be included in the search.
Revenue Center
Select the Revenue Center, if any, to be included in the search.
Employee
Select an employee to search.
Start Date
Select the Start Date to search. Note that the Audit Trail data is
automatically purged for data one month prior to the Current Month; also,
the Audit Trail is typically reset nightly (by FileMaintenance.exe).
Therefore, it may be possible that only today's Business Date shows Audit
Trail information.
End Date
Select the End Date to search. Note that the Audit Trail data is
automatically purged for data one month prior to the Current Month; also,
the Audit Trail is typically reset nightly (by FileMaintenance.exe).
Therefore, it may be possible that only today's Business Date shows Audit
Trail information.
54 MD0006-090
Audit Trail
Enabling
Reset Entries Until
Select a date. The date selected in this field is the cutoff point—all Audit
Trail data before this date will be purged from the database.
Note that the Audit Trail data is automatically purged for data one month
prior to the Current Month; also, the Audit Trail is typically reset nightly
(by FileMaintenance.exe). Therefore, it may be possible that only today's
Business Date shows Audit Trail information.
Security Maintenance
Overview
MICROS Systems, Inc. mandates that users abide by the Payment Card Industry’s
(PCI) Data Security Standards documented in the 9700 PABP Compliance
document.
To maintain the PCI Data Security Standard, please:
10. Track and monitor all access to network resources an cardholder data
For more information, please see the 9700 PABP Compliance document specific
to the site’s software version.
56 MD0006-090