Setting Up Access to iAccess

Use the Roles form in Ajera CRM (Configuration > Security > Roles) to provide access to iAccess for one or more users and define the level of access.

Basically, you define the role's access to one or more of these Ajera CRM info centers: Opportunity, Client, Vendor, and Contact. If you then select the option to give the role access to iAccess, the level of access defined for those info centers applies also to the corresponding areas and reports in iAccess.

On the General Tab...

Under Info Centers in the list of menu items on the General tab of the Roles form, do one of more of the following :
  • To provide access to the Opportunities area, the Dashboard area, and the Opportunities report in iAccess, select Opportunities.
  • To provide access to the Companies area, to client information in that area, and to the Companies report, select Clients.
  • To provide access to information for vendors that are not linked to clients in the Companies area and on the Companies report, select Vendors.
  • To provide access to the Contacts area and Contacts report, select Contacts.

On the Record Access Tab...

On the Record Access tab of the Roles form, use the Application Record Access grid to do the following for each application you selected on the General tab:
  • In the Access column, indicate if the role should have Full, Add/Modify, Modify Only, or Read Only rights for that application.
  • To restrict the records that the role can select or view with the application, click in the Record Level View column and click . Use the application's lookup dialog box to define the accessible records.
  • To restrict the records that the role can update, click in the Record Level Update column and click . Use the application's lookup dialog box to define the records that can be updated.

Also on the Record Access tab, select Allow access to records in iAccess.

For More Information

For more information about setting up security roles, display the Ajera CRM online help and, in the Contents pane, go to Configuration Overview > Security Configuration Overview > Roles Overview.