Security and User Access
Security configuration in Vision controls access to iAccess.
The basic steps for giving one of your employees access to
iAccess and controlling the level of that person's access are the following:
- Use the Roles form in Vision (Configuration > Security > Roles) to create a security role that provides the access you want the employee to have, if that role does not already exist.
- Use the Users form in Vision (Configuration > Security > Users) to set up a user record for the employee. The user record either contains a username and password that the employee uses to log in to both Vision and iAccess, or it specifies that the user can access those applications using Windows Authentication. It also contains the security role that defines that user's access to Vision and iAccess.
For More Information
For more information about setting up user records, display the Vision online help and, in the Contents pane, go to Configuration Overview > Security Configuration Overview > Users Overview.
Related Help Topics
Use these links to display lists of help topics that contain step-by-step instructions, field and option descriptions, and more in-depth discussions of selected subjects.
- Setting Up Access to the Business Development Workspace
Use the Roles form in Vision (Configuration > Security > Roles) to provide access to the Business Development workspace in iAccess for one or more users and define the level of access. - Setting Up Access to the Employee Workspace
Use the Roles form in Vision (Configuration > Security > Roles) to provide access to the Employee workspace in iAccess for one or more users and define the level of access. - Setting Up Access to the Project Management Workspace
Use the Roles form in Vision (Configuration > Security > Roles) to provide access to the Project Management workspace in iAccess for one or more users and define the level of access. - User Access to
Business Development Reports
Security for the Business Development reports is established in Vision Configuration. However, that access is not based on the access given to Vision reports. Instead, access to the Business Development reports is based on a user's access to the corresponding Info Center. For example, a user's access to the Opportunities report depends primarily on the access his or her security role has to the Opportunity Info Center in Vision. - Tab Access and
Business Development Field Access
If an application tab is hidden for a security role on the Access Rights of the Roles form in Vision (Configuration > Security > Roles), any fields on that tab that are available in iAccess are also hidden for users with that security role, regardless of where they appear in iAccess.
Parent Topic: Configuration and Administration