Process for defining security

The process for defining security is summarized here.

  1. Define user groups to organize users who require the same level of security.
  2. Define roles, based on users’ job descriptions, that differentiate access to forms and tabs.
  3. Define object security for each role.
  4. Create users.
  5. Add Groups and Roles to the user.
    Note: 
    • If the Access Collections, these are added directly to the User. The specified Roles and Groups resulting from the Access Collections are displayed in read-only mode.
    • If the Access Collections are not used, roles and groups are assigned to users directly.
  6. Define a role for master users.
  7. Define the user’s password properties for the database.