Security features are configured and managed via the Settings option, this manual covers two areas of security:
User Roles & Users
API Keys
To configure your Security settings click on your logged-in user name in the top right-hand-corner of the screen > Settings > Security.
User Roles & Users
Users are the people who perform the day-to-day tasks (e.g. process service requests/orders, monitor performance, setup configuration) either through the User Interface or Web APIs, subject to business network and security restrictions.
User Roles are a group of permissions assigned to users and define the access that users have throughout the system (e.g. to manage Contacts, to configure Reward Offers).
API Keys
API Keys are unique identifiers that allow a client application (e.g. mobile app, external system) to consume the system's Web API (back-office/self-service)
Public Key is used solely as an organisation identification allowing users to consume self-service APIs
Secret Key should be kept confidential and are used for performing business actions in the CRM.COM product (such keys fall under security restrictions and permissions)
Heading 3
Heading 3
Formatted text
Heading 3
Security
Reference Material
You may also find it useful to refer to the following manuals for further reading in relation to Security.