Security Configuration Overview

Vision's Security features make it possible for your system administrator to grant or restrict user access to modules, forms, and records in Vision.

To define each user's rights to Vision, the system administrator first creates user roles that reflect your organization's business rules. For example, a "marketing" role restricts a user's access to the Vision features that relate to marketing. The system administrator then assigns each user to a role.

This "role-based" security approach provides flexibility and ensures that users have access to the specific processes and data that they need. When a user logs on, Vision verifies the person's username and password, and identifies the user's role.

When you save users, passwords, and roles, Vision automatically performs a licensed user check. The number of users that you set up must not exceed the number of licenses that your firm holds. For example, if you attempt to set up five Vision CRM users, you must have a minimum of five CRM licenses. When Vision calculates the number of employees set up in Vision, Vision does not count employee records that are marked as "Consultant" or "Terminated" in the Employee Info Center.

Related Topics