Security Configuration Overview
Vision's Security features make it possible for your system administrator to grant or restrict user access to modules, forms, and records in Vision.
To define each user's rights to Vision, the system administrator first creates user roles that reflect your organization's business rules. For example, a "marketing" role restricts a user's access to the Vision features that relate to marketing. The system administrator then assigns each user to a role.
This "role-based" security approach provides flexibility and ensures that users have access to the specific processes and data that they need. When a user logs on, Vision verifies the person's username and password, and identifies the user's role.