Blog Post

Role Based Security


Control access to service bureau or client users by associating them with roles.  Each unique user can have a set of security permissions assigned to it with hundreds of options.  The permissions are checked to determine a user’s authorization to access areas of the system, perform tasks, and run reports.  Administrators control the access users have by assigning each user to a predefined role.