Security Roles
Use the Security Roles screen to set up screen rights, based on your licenses, for system modules.
Modules are grouped for each role you have created. You can assign the role to an employee. For example, you could create a role of ADMIN, giving full rights to both Time and Expense. Then you could assign all employees who are designated administrators to the ADMIN role. You can create a role of EMPLOYEE, giving full rights to either the Time module only or the Expense module only.
Please review the Deltek Time Collection Getting Started Guide for more information.
You cannot delete a Role Code if it is being used as the default role code in the Configure General Settings screen or if it is being used for an employee's role. You also cannot delete the Default security role that was shipped with the system as part of the initialization data.
Location
To display the screen, complete the following steps:
- Click .
Contents
Identification
Field | Description |
---|---|
Role Code |
Enter a 10-character, uppercase alphanumeric Role Code. Each Role Code must be unique. Although this code does not display in other screens, you should assign a meaningful code because this field can be used in user-defined reports/inquiries. |
Description |
Enter a Role Code description of up to 30 characters. Because they are used in drop-downs and as column headings for reports/inquiries, make descriptions as short as possible and properly capitalized. Each role code description must be unique. |
Security Settings
Field | Description |
---|---|
Apply Employee Level Security |
Select this check box to turn on employee level security. This check box is unselected by default. See Concept Topic: Employee Level Security for more information. |
Apply Charge Level Security |
Select this check box to turn on charge level security. This check box is unselected by default. See Concept Topic: Charge Level Security for more information. |
Modify Employee Role |
Select this check box to allow employees with this security role to change other employees' security roles in the Default tab of the Employee Information screen. This check box is unselected by default. |
Time Zone Settings
Field | Description |
---|---|
Modify Time Zone |
Select this check box to allow employees with this security role to change their time zone. This check box is unselected by default. |
Delegation Settings
Field | Description |
---|---|
Allow Delegation |
Select this check box allow employees with this security role to delegate their tasks to another employee when they are unable to perform those tasks themselves. This check box is unselected by default. |
Sync User Groups | Click Sync User Groups to remove user groups that no longer exist in Costpoint. |
User Groups Subtask
Use the User Groups Subtask to assign user group(s) and modules to the Security Role.
Field | Description |
---|---|
User Group ID | Click to select the user group or groups to which the Security Role belongs. |
User Group Name | This field displays the name of the selected User Group ID. |
Time or Expense |
From the drop-down, select the modules the Security Role can access:
|