Learn More About...
Review examples of security roles and things to consider if you're using multiple companies.
Related Topics:
- Record Level Security
In record level security you control a security role's access to specific hub records. - Examples of Security Roles
If you are new to Deltek, you may find it helpful to review security role examples. - Example of How to Set Up Security
If you are new to Deltek, you may find it helpful to review an example that shows how an enterprise uses Security Configuration to set up 300 users. - Performance Canvases and Role Security
You can specify that a security role have access to the Deltek Performance Canvases application. If you do, the performance canvases display as URLs in the Available Web Dashparts column. - Security Access to Transactions
Your system administrator uses Role Security to specify the types of transactions that a role can access, as well as the functions that the role can perform for each transaction type. - Access to Screen Designer
A user's security role determines whether he or she can access Screen Designer in the browser application to customize the contents of a hub. - Access to Dashboard Designer
The user's security role determines access rights to the Dashboard Designer where dashparts and dashboards for the browser application are created and modified. - Access to Dashboard
The user's role determines access to Dashboard and also the type of information that is displayed while viewing specific dashboards. - Users Form Views (List or Detailed)
Use the buttons on the Users form to select the type of view to use for your security settings.
Parent Topic: Roles