Security Settings
Security features make it possible for your system administrator to grant or restrict user access to applications, forms, and records.
To define each user's rights in Vantagepoint, the system administrator first creates user roles that reflect your organization's business rules. For example, a "marketing" role restricts a user's access to the features that relate to marketing. The system administrator then assigns each user to a role.
This "role-based" security approach provides flexibility and ensures that users have access to the specific processes and data that they need. When a user logs on, Vantagepoint verifies the person's username and password, and identifies the user's role.
When you save users, passwords, and roles, Vantagepoint automatically performs a licensed user check. The number of users that you set up must not exceed the number of licenses that your enterprise holds. For example, if you attempt to set up five CRM users, you must have a minimum of five CRM licenses. In calculating the number of employees set up, Vantagepoint does not count employee records that are marked as "Consultant" or "Terminated" in the Employees hub.
Windows Integrated Security
Information will be provided in a future release.
Vantagepoint supports Windows Integrated Security, which allows users to log in one time for both Windows and the Vantagepoint application. Integrated Security logs a user into Vantagepoint based on the user’s Windows domain network login. If a user is not logged in to the company network, the user is prompted for a network ID and password before logging in.
- Related Topics:
- Checklist: Setting Up Security
Before you establish security settings for the first time, review the steps required. - Roles
Security roles define each user's access rights and determine what actions the user can perform. Vantagepoint identifies a user's security role when the user logs in. You must assign each user to a role. Be sure to evaluate the predefined security roles before you create new ones. - Users Settings
When you implement security, you must create a user record for each individual who will use Vantagepoint. Each user must have a unique username. - Password Policies
Before creating users, use Password Policies Security to establish the criteria for acceptable Vantagepoint passwords. These policies apply when users change their own passwords, which they can do after the initial log in. - Logins and Passwords
If you are new to Vantagepoint, you should become familiar with login procedures and know how to change your password. - Windows Integrated Security
Vantagepoint includes an option for Windows Integrated Security, which allows users to log in one time for both Windows and the Vantagepoint application.