How Security is Applied in the Browser

You can grant or restrict user access to applications, forms, and records. This is typically a system administrator task.

To define each user's access rights, you first create user roles that reflect your organization's business rules. You then assign each user to a role, which determines which actions the user can perform. Each user's security role is identified at log-in.

You assign security role access to applications on the Overview tab of Role Security. You can assign full access rights to all options, or expand the tree and sub-menus to define specific rights to areas of the application.

When you grant access to a hub, the members of the security role can initially access only the Summary pane and Overview tab for that hub. To grant access to additional tabs in the hub, use the Access Rights tab of the Roles form.

After determining application access, you can use the Screen Designer feature to establish a role's access to the fields, grids, lookups, and report information for the hubs by doing the following:
  • Show or hide tabs.
  • Show or hide fields or grids. These settings also apply to any related fields or grids in custom searches.
  • Lock a field or grid. This allows users to see the field or grid but not edit it.
  • Require an entry in certain fields.

See the tab, field, and grid properties options on the Screen Designer form for more information.