# Introduction
The following document serves as an introduction to the iAccess for Maconomy product. The target audience is technical consultants and partners that need to install, extend, and maintain iAccess. The content is structured in the following parts:
- In the first part, we will describe core concepts of the iAccess architecture.
- The second part describes how it can be installed using MConfig.
- The third part describes how it can be extended using the Maconomy Extender.
- In the fourth part, we will provide an overview of the current extension toolkit.
- The fifth part contains an API reference describing the facilities available in the extension toolkit.
- Finally, the last part contains a migration guide, and a troubleshooting guide. Both of these guides should be particularly useful when upgrading an existing iAccess installation.
# Contact & Support
For bug reports, feature requests, or questions, visit our UI-iAccess (opens new window) channel under the Maconomy Knowledge Center team in Microsoft Teams.
# Disclaimer
While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical errors may exist. The recipient of this document is solely responsible for all decisions relating to or use of the information provided herein. The information contained in this publication is effective as of the publication date below and is subject to change without notice. This publication contains proprietary information that is protected by copyright. All rights are reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, or translated into another language, without the prior written consent of Deltek, Inc.
This edition published September 2021.
® 2021 Deltek Inc.
Deltek’s software is also protected by copyright law and constitutes valuable confidential and proprietary information of Deltek, Inc. and its licensors. The Deltek software, and all related documentation, is provided for use only in accordance with the terms of the license agreement. Unauthorized reproduction or distribution of the program or any portion thereof could result in severe civil or criminal penalties. All trademarks are the property of their respective owners.