Security Overview

Vision's security let the Vision System Administrator grant or restrict a user's access to applications, forms, records, and options in Vision.

Create Roles

As the first step in setting up Vision security, you create user "roles" that reflect your organization's business rules. For example, a "marketing" role can only view those portions of Vision that relate to marketing activities.

After you create roles, you can assign each user or a group of users to a role. Every user must have a role.

Use record level security to limit a user's access to specific records (specific projects, opportunities, employees, and so on). For example, you may limit a marketing person's access to only those opportunities in a particular region of the country.

Create Users

Users are individuals who use Vision. Every user must have a user record in Vision. Create a user from scratch or from an existing Employee Info Center record, then assigned the user to a role.

When a user logs in, Vision only lets the user perform actions to which his or her security role has access.

Assign Passwords

To log into Vision, each user must have a Vision username and password. The System Administrator establishes password policies and determines the username and password for each Vision user. The user cannot change his or her username, but can change his or her password.

Windows Integrated Security

Deltek Vision supports Windows Integrated Security, which allows users to log in one time for both Windows and the Vision application. Integrated Security logs a user into Vision based on the user’s Windows domain network login. If a user is not logged into the company network, the user will be prompted for a network ID and password before he or she can log in to Vision.

Related Topics