Security Profiles

Security Profiles are used to define multiple levels of system access permissions within specified companies. Administrators can Create New Security Profiles, Copy Security Profiles, Modify Security Profiles and generate a Report of Security Profiles. Also see Related Tasks.

 

Create a New Security Profile

 

  1. Enter a New Profile Name.
  2. Select each System Access that applies to this Profile.
  • To select access to all click All.
  • Click the + to expand the tree to each menu group.
  • Click the - to collapse the menu group.
  • An asterisk (*) indicates an additional function within a program.
    • Example: Add a New Site or New Service from Schedule Call In.
    • Example: Update Credit Warning or Limit from Account Inquiry.
  • Remove the check mark to deny access.
  • Menu Groups with one or more systems with denied access will display in Blue.
  1. Select applicable Note Type, Custom Menu and Attachment Type Access.
  2. Select applicable customer Menu Access.
  3. If the security profile will be using the Export Codes to Other Companies, place a check in the box.
  4. If the security profile will be denied access to change Credit Warning or Limits, place a check in the box.
  5. Click Create New Profile.

 

Copy Security Profile

  1. Select Copy Another Security Profile.
  2. Enter the New Profile Name.
  3. Select the Profile To Copy from the drop down.
  4. Click Create New Profile.

 

Manage Security Profiles

 

  1. Select a Profile Name from the drop down.
  2. Make Changes. Optional Changes:
  • Add or Remove System Access.
  • Change Profile Name.
  • Delete Profile.
  • Add or Remove Note, Custom or Attachment Access.
  • Add or Remove Export Codes or Credit Warning/Limit Changes.
  • Profile Utilization will include all Users/Company with this Profile.

 

Security Profiles Report

 

  1. Select Detail or Summary.
  • Detail: Lists each granted System Access Menu for each Profile Name selected.
  • Summary: Lists only the granted Security Profile name by user/company.
  1. Select Show Inactive User if you would like inactive users included on the report.
  2. Select all or specified Profile Names to include.
  3. Select all or specified Companies to include.

Report Sample:

 

User Maintenance

Security Profiles

Field Level Security