What does this section cover?
Navigating to Security Profiles
FINANCE APPLICATION > SECURITY MANAGEMENT > MANAGE SECURITY PROFILES
Explaining Security Profiles Fields
Name | Description |
---|---|
Name* | The security profile name |
Alternative code* | The security profile alternative code |
Description | A description of the security profile |
Module information* | Includes the following:
|
Related features | Lists all features which are provided by the selected module |
Suggested additional configuration | Lists other areas of the system that are related with the selected module as a suggestion for additional configuration |
Available menu options | Lists all Main Menu options and Shortcut Menu options and provides the capability to allow or deny access on each one of them |
Common processes | Lists all common processes related with the selected module and provides the capability to allow or deny access on each one of them |
Additional processes | Lists all additional processes related with the selected module and provides the capability to allow or deny access on each one of them |
Custom processes | Lists all custom processes related with the selected module and provides the capability to allow or deny access on each one of them |
Web API methods | Lists all Web API methods related with the selected module and provides the capability to allow or deny access on each one of them |
Reports | Lists all reports related with the selected module and provides the capability to allow or deny access on each one of them |
Printouts | Lists all printouts related with the selected module and provides the capability to allow or deny access on each one of them |
Interfaces | Lists all interfaces related with the selected module and provides the capability to allow or deny access on each one of them |
Dashboards | Lists all dashboards related with the selected module and provides the capability to allow or deny access on each one of them |
Inherited security profiles | Lists all security profiles which are inherited by the specific security profile |
Creating & Saving, Validations & Restrictions
Action | Validations |
---|---|
General |
|
Create |
|
Edit |
|
Delete |
|
Save |
|
Creating a Security Profile
- Search using the criteria available in the summary page
- From the top menu click on the NEW to open the Security Profiles data entry page
MAIN INFORMATION
- Provide the required Information:
- Name
- Alternative Code
- Description
- Provide the required Information:
INHERITED SECURITY PROFILES
Click on ADD to select Security Profiles Inherited by This Security Profile
Inherited Security profiles will override configuration made on the existing Security Profile being created. For example if a security profile for team leaders does not allow access to any module configuration, then the security profile for team members, which extends the team leaders security profile will also not have access to any module configuration, even if it is defined within that profile that access is allowed.
Inherited Security Profiles are helpful when the intention is to create a new Security Profile that will have additional Restrictions to ones from an existing Security Profile. Read below to find out how you can quickly create a new Security Profile Inheriting Restrictions from another.
MENU ACCESS
MAIN MENU
- Use the Filter By Module to select the module to apply access restrictions on
Through the available main menu items select the ones to ALLOW or DENY ACCESS using the related buttons
If inherited profiles exist then items may be shown as allowed but they may be denied by the inherited profile.
SHORTCUTS MENU
Through the available shortcut menu items select the ones to ALLOW or DENY ACCESS using the related buttons
If inherited profiles exist then some shortcut menus may be shown as allowed but they may be denied by the inherited profile.
MODULE ACCESS
There is a list with all the modules available on the left hand side of the screen
Filter the list of the available modules by selecting an application through the filters list which is available on top of the list of modules
Use the list of modules to select one of them and define the following processes available:
Common Processes
Additional Processes
Custom Processes
Web API
Reports
Dashboards
Interfaces
Printouts
Select the ones to ALLOW or DENY ACCESS using the relative buttons
If inherited profiles exist then some modules may be shown as allowed but they may be denied by the inherited profile
Click on SAVE
LOG INFORMATION
The following information is automatically set by the system on saving the Security Profiles
Log information section keeps all the logging information related to the specific record
- Basic set of information available in all entities
- Created By User: The user that created the entity
- Created By Unit: The unit of the user that created the entity
- Updated By User: The user that last updated the entity
- Updated by Unit: The unit of the user that last updated the entity
- Date Created: The date the account was entity
- Date Updated: The date the account was last entity
- Basic set of information available in all entities
Visit Understanding Security Management for business examples related to Security Profiles.
Related Areas
-
Setting up Privacy Level Groups & Privacy Levels — Learn to configure Privacy Level Groups
-
Setting up Automatic Collaboration Rules (ACR) — Learn to configure Automatic Collaboration Rules (ACRs)
-
Managing Security Profiles — Learn to work with Security Profiles
-
Understanding Security Management — Understand the usage of Security Management within CRM.COM.
-
Setting up Conditional Security Restrictions (CSR) — Learn to configure Conditional Security Restrictions (CSRs)
-
Setting and Using Audit Trail — Learn to configure Audit Trail Settings
-
Setting up Privacy Level Assignment Rules (PLARs) — Learn to configure Privacy Level Assignment Rules (PLARs)
Popular Labels
- accounts-receivable
- accounts-receivable-admin
- accounts-receivable-advanced
- accounts-receivable-advanced-r7
- accounts-receivable-basics
- activities
- activities-admin
- activities-admin-r7
- activities-basics
- activities-basics-r7
- additive-discounts-admin
- additive-discounts-advanced
- additive-discounts-basics
- billing-application
- billing-engine
- communication-centre
- communications-advanced-r7
- conax-web-services-advanced
- conax-web-services-basics
- contact-information
- contact-information-admin-r7
- crm-application
- crm-application-r7
- customer-events-basics-r7
- dashboards-advanced
- finance-application
- financial-transactions-admin
- financial-transactions-admin-r7
- financial-transactions-advanced
- financial-transactions-advanced-r7
- foundation-application
- foundation-application-r7
- global
- inventory-management
- inventory-management-advanced
- inventory-management-basics
- inventory-management-basics-r7
- jobs
- jobs-admin
- jobs-admin-r7
- jobs-advanced
- jobs-basics
- jobs-basics-r7
- leads
- leads-admin
- leads-admin-r7
- network-management-basics
- network-management-basics-r7
- normal-billing-admin-r7
- normal-billing-r7
- normal-billing-run-admin
- normal-billing-run-basics
- notifications
- notifications-basics
- panaccess
- platform-advanced
- platform-basics
- prepaid-billing-basics
- prepaid-billing-r7
- price-plans
- products-admin-r7
- rated-billing-items-advanced
- rated-billing-items-basics
- reports-basics
- resource-scheduling-advanced
- rewards-admin-r7
- rewards-advanced
- rewards-advanced-r7
- rewards-basics
- rewards-basics-r7
- security-management
- security-management-advanced
- security-management-advanced-r7
- segmentation-basics
- service-requests-admin
- service-requests-admin-r7
- service-requests-advanced
- service-requests-advanced-r7
- subscription-actions-r7
- subscriptions
- subscriptions-advanced
- subscriptions-advanced-r7
- subscriptions-basics
- subscriptions-basics-r7
- udrs
- udrs-admin-r7
- usage-service-r7
- user-management
- user-management-basics
- vouchers
- vouchers-advanced
- vouchers-basics
- wallets
- wallets-admin
- wallets-advanced
- wallets-basics
- workflows-admin-r7
- workflows-advanced-r7
- workflows-r7
- zapier-basics-r7