Security Settings

System administrators use security features to grant or restrict user access to applications, forms, and records.

To define each user's rights in Vantagepoint, the system administrator first creates user roles that reflect your organization's business rules. For example, a "marketing" role restricts a user's access to the features that relate to marketing. The system administrator then assigns each user to a role.

This "role-based" security approach provides flexibility and ensures that users have access to the specific processes and data that they need. When a user logs on, Vantagepoint verifies the person's username and password, and identifies the user's role.

When you save users, passwords, and roles, Vantagepoint automatically performs a licensed user check. The number of users that you set up must not exceed the number of licenses that your enterprise holds. For example, if you attempt to set up five CRM users, you must have a minimum of five CRM licenses. In calculating the number of employees set up, Vantagepoint does not count employee records that are marked as "Consultant" or "Terminated" in the Employees hub.

Windows Integrated Security

Vantagepoint supports Windows Integrated Security, which allows users to log in one time for both Windows and the Vantagepoint application. Integrated Security logs a user into Vantagepoint based on the user’s Windows domain network login. If a user is not logged in to the company network, the user is prompted for a network ID and password before logging in.