Learn More About...
Review scenarios for setting up security roles, background information on record level security, and guidelines for providing access to transactions, dashboards, Screen Designer, and more.
- Related Topics:
- Predefined Security Roles for New Implementations
If you implement Vantagepoint as a new system, a set of predefined security roles are provided automatically. You can assign users to these roles, or you can use them as models to create your own security roles. - Example of How to Set Up Security
If you are new to Vantagepoint, you may find it helpful to review an example that shows how an enterprise uses Security Settings to set up 300 users. - Examples of Security Roles
If you are new to Vantagepoint, you may find it helpful to review security role examples. - Record Level Security
In record level security, you determine a security role's access to specific hub records. - How Security is Applied in the Browser
You can grant or restrict user access to applications, forms, and records. This is typically a system administrator task. - Hiding Tabs in Vantagepoint
When you hide a tab in the hubs or Chart of Accounts Settings from a security role, the tab is hidden, the non-essential fields on the tab are secured, and the essential fields on the tab are locked. - Essential Fields in Vantagepoint
Essential fields are certain fields in hubs and Chart of Account Settings that are necessary for Vantagepoint applications to work properly. - Role Security and the Employee Card
A user's security role determines how much information the user sees on the employee card for an employee. - Role Security for the Exports Utility and Integrations Manager Utility
In Roles Security Settings, a system administrator gives a role access to the appropriate export functionality in the Exports and Integrations Manager utilities. - Performance Canvases and Role Security
You can specify that a security role has access to the Vantagepoint Performance Canvases application. If you do, the performance canvases display as URLs in the Available Web Dashparts column. - Assigning Full Access Rights to Users
There are significant security implications when full access rights are assigned on the Overview tab of the Roles form in Security Settings. - Access to Transactions
In Role Security, you specify the types of transactions that each role can access, as well as the functions that the role can perform for each transaction type. - Access to Dashboards
Each user's security role determines both access to the Dashboards form and the type of information that is displayed on it when users view specific dashboards. - Access to Dashboard Designer
The user's security role determines access rights to the Dashboard Designer, where you create and modify dashparts and dashboards for the browser application. - Access to Hubs
Using role security, a system administrator determines whether or not users have access to a hub, as well as which tabs and fields they can access in the hub. - Access to Screen Designer
Role security determines whether or not a user has access to Screen Designer. - Access to Activities
You can enter activities in the Activities hub, but you can also do so in many other hubs. Similarly, specifying access to activities for a security role may involve a number of different settings. - Access to Resource Planning
In most cases, the settings that you select for a security role on the Roles form control the access to the Resource Planning module for users assigned that security role.
Parent Topic: Roles