Security

System administrators use Security settings to grant or restrict a user's access to applications, forms, records, and options.

Create Roles

As the first step in setting up security, you create user roles that reflect your enterprise's business rules. For example, create a marketing role that can only view those portions of Vantagepoint that relate to marketing activities. After you create roles, assign each user or a group of users to a role. Every user must have a role. Use record level security to limit a user's access to specific records (specific in pursuit projects, employees, and so on). For example, you may limit a marketing person's access to only those in pursuit projects in a particular region of the country.

Create Users

Users are individuals who use Vantagepoint. Every user must have a user record in Vantagepoint. Create a user from scratch or from an existing Employees hub record, then assign the user to a role.

When a user logs in, the user can perform only those actions to which their security role provides access.

Assign Passwords

To log in to Vantagepoint, each user must have a Vantagepoint username and password. A system administrator establishes password policies and determines the username and password for each user. Users cannot change their usernames but are allowed to change their passwords.

Windows Integrated Security

Vantagepoint supports Windows Integrated Security, which allows users to log in one time for both Windows and the Vantagepoint application. Integrated Security logs a user in to Vantagepoint based on the user’s Windows domain network login. If a user is not logged in to the company network, the user is prompted for a network ID and password to log in to Vantagepoint.

You can use single sign-on functionality if you sign up for and configure Microsoft Azure Active Directory (Azure AD).