Creating Users and Assigning Rights

The EBMS software contains a very flexible security system. A user's access to historical or financial data can be restricted by using the following security options:

  1. Program Level: A user can not access EBMS unless they have access to a valid password.

  2. Module Level: A user can be barred from accessing specific modules such as payroll or general ledger. Continue with this section for more details on module security settings.

  3. Window or File Level: A user can be restricted from accessing a specific file or window that access the contents of that file. Review the Setting the Parent Security within a Window for more details on this security option.

  4. Tabs and Fields: The contents of a tab or specific field can be restricted or hidden based on a security level. For example, a secretary may enter payroll information but the rates and pay is hidden from the user.

  5. Buttons and Processes: A button or process can be restricted by disabling a button or process. For example, the deletion or process of a document can be restricted based on the security settings. Review the Setting Security for a Tab, Entry Field, Button, or Process for more details.

  6. Report Level: Access to individual reports is restricted by the report's security setting. Review the Setting Report Security section for more details.

Eagle Solutions recommends that users be assigned individual login names even if security is not a concern of management. Some additional advantages are as follows:

Setting a specific data entry field to "no access" is an effective way to disable the field if management does not wish to use the information.

Security is maintained under File > User Management. The System Administrator is the person responsible for maintaining the security of EBMS. Only a user with Administrator permissions can access the User Management window shown below:

Click on the New button to create a new user.

Enter the new user's name. This entry becomes the user's login name. The login can be the person's first name or complete name. Review the Processing Commissions > Processing a Sales Invoice with Commissions section of the salesperson commission manual for an example of using the login name within a document.

Enter the Full Name and Description information. The Permissions setting located on the Name tab will set the general security permissions that affect access to general company information dialogs launched from the File menu.

Permission security settings for other EBMS modules are set within the Modules tab. The permission settings within the Modules tab will be changed to match the permission setting in the Name tab if all the module settings match the permission setting on the Name tab.

The Permissions drop-down shows the various levels available to users. They are as follows:

Administrator

Manager

Advanced Entry

Basic Entry

Viewer

No Access

Additional levels can be added to the option list. Contact an EBMS consultant for details.

The Inactive switch (hidden in the graphic by the permissions drop-down menu) can be used to remove access from a terminated employee without deleting him from the database. This effectively disables the user's account.

The OK, Cancel, Delete, and New buttons allow the Administrator to make the necessary changes as personnel are hired, terminated and promoted or given greater responsibility and access to EBMS.

The Password tab is where the administrator can change the employee's password if it was forgotten. Review the Creating or Changing a Password section for more details on passwords.

The Modules tab is where the specific Module security levels are set. Joe Worker is a counter clerk and needs access to the Sales and Inventory Modules. The Company does not want him to be in the General Ledger, Expense, or Payroll modules. The permission levels under each module are the same as given in the Permissions field under Name as shown in the first window of this section.

Results of Violating Security

If an employee tried to get into Payroll > Employees, this is what he would see:

The information he tried to access is shaded out and invisible.