AyMINE – Technical documentation
Interfaces to other systems
Enterprise Architect Connector
Business excelenece
Balance Scroecards
Task & Project Control
- Helpdesk ticket - reply to customer
- Test
- Qualification of user or contact
- Project role
- What makes up the methodology / QMS
- dragdrop
- Location
- My areas
- Kanban Task Overview
- Personal Task
- Internal helpdesk
- Customer Care Centre
- Project baseline
- Return project plan by baseline
- Project Schedule
- Processing time sheets
- Records managed by a project
- Activation buttons
- Why some data can't be deleted
- Starting events
- Qualification of user or contact
- task_taskobjects
- Project
- Reminders and Messages
- eventobj_raisingevents
- decision_decobjects
- eventobj_startingevents
- eventobj_eventbuttons
- Type of tests
- Deal management
- FMEA - Detection
- FMEA - Features
- FMEA Methodology | AyMINE
- FMEA - Occurence analysis
- FMEA Severity analysis
- FMEA
- Management of responsibilities - RACI Matrix
- RACI Matrix for Project
- Improvements and Preventive Measures
- Notice – example of use
- tskproblem_terminology
- 8D report
- Task Scheduling
- Administration of the Task Management Module
- Adminitration of areas, projects, calendars
- Discussion
- GDPR and record of qualifications
- System rights for the task management module
- Project Planning
- Employee Tasks
- Incident and Quality Issue Management
- Collaborative Resolution of Multiple Problems
- List of business areas
- Required qualifications
- Plan template / strategy
- Decision
- Configuration Package
- Record template
- Change management process in a project
- Task list
- Requirements
- Team Member
- Right to Manage Qualifications
- Input requirements
- Obligation
- Competencies and Skills
- Problems, tickets and their management
- Meeting
- Package definition
- Phrases and terms
- Data Area
- Risk
- Task
- Business event
- Task, project & quality management
- Records and protocols
- Directives and Policies
- Events
- Risk Pattern
- Information
- Project definition
- Activity log
- eventinstances
- Personal calendar
- Objects of decision making
- Event activation buttons
- Objects affected by the problem
- Variant decision-making
- Recorded activities
- Self-Reminders
- QMS and Task Management
- Objects related to the task pattern
- Effect of the task on the right to modify the atta
- Level of Competence
- Manager approval with the task report
- Region / project / methodology
- Manage your marks
- tskdefusertask
- Quality Management System (QMS)
- tsktask_batasks
- Project Team
- Events and meetings
- Events and meetings
- List of event instances
- moduleclientoptions
- Processed objects
- Mark patterns
- Notification events
Interprocess management
Human Resources
- hrstcontract
- roles
- Human resources
- Digital Personnel Archive
- Personalistics – User Permissions and roles
- Registration of job seekers
- Manage department / division data
- Job Position
- Worker
- Worker overview
- An overview of your staff
- Responsible HR Manager
- Synchronizing staff and system users
- modulesafety
Asset Management
- Products, assets and sales
- Tendering and purchasing
- Analytical model
- Product Supplier
- Product Categories
- Product or Product Property
- Project Goal
- Business Offer
- Offers summaries
- Recalculate bid
- Offer and Price Access Rights
- Creating and processing orders
- System order status query
- Order Reports
- Pricing
- Pricing – volume discounts
- Products and Goods
- Product status and change
- Product Units
- Quality criteria
- Why are the Quality criteria usefull
- DFMEA - Product FMEA
- Hara | Hazarad & Risk Analysis
Customer Relationship - CRM
- Contacts and directories module (
- System Permissions and CRM Module Settings
- Customer Order Overview
- Address books
- Address book list and management
- Privacy policy
- Send bulk messages in compliance with GDPR
- Bulk email footer
- Unsubscribe and set preferences
for bulk mail - How to correctly forget a person's details
- Bulk Emails
- Contracts
- Partner in a contract
- Message patterns
- Groups of contacts
- Directory or people and companies
- Contact per person or company
- Quickly available contacts
Finance management
System modules
System management
- moduleclientoptions
- digiSign
- formattedtexts
- System Configuration
- Processes in use
- Client
- Public Client
- Configure gateways for external messages
- E-mails and external communication
- Email messages
- Rules for external messages
- Secure business communication
- Send SMS directly from CRM
- Call directly from CRM
- Documents and files
- Additional functions with files
- Copying and moving files between objects
- Picture presentation
- Public link to the document
- Recent Files
- Dashboard
- Object location on the board
- Client items
- Revisions and comments
- Securing posts and internal discussions
- Translations
- Record Relationships
- Relation types
- sysrole
- User Processes
- System module
- System User
- User administration
- User Administration
- Connecting users to VOIP PBX
- Secure Key Wallet
- Data vault
Framework
- frmobjectextension
- introhelp
- introhelp_mobile
- introhelp_aplikace
- versioninfo
- releases
- AyMINE modules and basic types
- cliplink
- introhelp_settings
- introhelp_deleting
- introhelp_dragdrop
- list_filtering
- AyMINE intro
- AyMINE access security
- AyMINE Modules
- Object locks
- System rights
- introhelp_keyshortcuts
- introhelp_shortcuts
- introhelp_icons
- list
- introhelp_generalinfo
- introhelp_objectdetail
- introhelp_objectlist
- introhelp_privateobjectnotes
- AyMINE User Rights Control
- introhelp_dashboard
Data vault
A data vault is a shared, encrypted space for storing secrets, sensitive and classified information within an organization.
The data vault is accessed using an access key that is stored in the user's access key vault. The user does not directly work with the key or enter it, but receives the key encrypted from the administrator.
Without the corresponding key, the data remains inaccessible. Access to the information is controlled to ensure that it is protected from unauthorized access and leakage.
The data vault is designed in accordance with the principles of protecting classified information (e.g. as required by the NSA at the "Secret" level).
Security model
Security model
- Access keys to the vaults are always transferred and stored in encrypted form
- Stealing of encrypted keys does not allow misuse
- The user receives only access permissions from the administrator, never a password (secret)
- Decryption of the key takes place exclusively on the user's trusted device
- The system never works with open keys outside the user's device
- The system does not have the ability to obtain a password (secret) from the safe
- Data access is audited
When it is advisable to use the data safe
You can store any sensitive information, requests or documentation you are working with at AyMINE in the data safe.
Science: Research Confidentiality
Research results, interim notes and team know-how are all sensitive information.
It is advisable to create a separate data safe for each research and share it only with the team members working on it.
Unlike common shared repositories, you have precise control over who has access to the data.
Research and internal procedures are sensitive corporate assets. Their protection should be a priority for each team and organization.
Product: Product or Service Confidentiality
When developing a new product, it is necessary to protect sensitive information, but at the same time to work with it effectively.
The data vault allows you to work with requests and documentation in a normal way, but only those to whom the administrator has granted an access key have access.
During the course of the project, access can be gradually expanded without losing control over the history and structure of the information.
Protection Know-How: Secrecy of procedures and activities
Internal processes, methodologies and related documents often contain valuable know-how. Their disclosure should always be controlled.
Secrecy tasks remain part of the normal workflow, but are only visible to users who have an appropriate access key. Whole workflows are protected as well. This protects the workflow and its concrete implementation.
Legal documents: Secrecy of contracts
The data vault allows you to safely prepare contracts and other sensitive documents.
Access is limited to users who have received an access key from the data vault administrator, such as the author and the authorizer.
Secure storage of access to servers and services
Access data management is critical to the security of the entire organization. Data vaults provide
- Secure protection against unauthorized access
- Availability when keys and passwords are needed
- Quick controlled accessibility when a missing employee needs to be quickly replaced
This data is stored in the data vault and made available only to selected persons through access keys stored in their access key vault.
Each access is recorded and auditable, including the ability to set up notifications for its use.
The system supports encryption recommended for storing passwords and access keys.
Related links
- For more information on encryption, please visit the FAQ page: FAQ on data encryption and data protection
- Overview of basic terms for encryption in the company