Adding, Editing, or Deleting Security Groups
You use security groups to specify tasks that users can perform.
- Make sure security is selected for the system database for this company.
When security is turned on for the system database, a user who is assigned Maintain Users authorization can add, delete, or modify user accounts. (Users without this authorization cannot change records for a secured company database, and only the Admin user can change ADMIN settings.)
- Activate all your applications. For more information, see Activating Applications.
- Add users, making sure each user has a unique password. For more information, see Adding, Editing, or Deleting Users.
To add or edit a security group:
- Administrative Services > Security Groups.
- In the Application field, select an application.
- In the Group ID field, enter a new ID to add a security group, or enter the ID for an existing security group that you want to edit.
- If you are adding a new security group, in the Group Description field, enter a description for the security group.
- Select the check box for each security authorization you want to assign to users in the group, and clear the check box for each security authorization you do not want to assign to users in the group. (Each security authorization empowers users to perform specific tasks.)
Tip: To select all security authorizations, click Select All. To remove all security authorizations, click Remove All.
- Repeat steps 3 through 5 for each security group you are adding or editing for the application.
- Add or edit security groups for the remaining applications.
- If you are adding a new security group, click Add. If you are editing an existing security group, click Save.
To delete a security group:
- Administrative Services > Security Groups.
- In the Application field, select an application.
- In the Group ID field, enter the ID of the security group.
- Click Delete.
- Click Close.
The next time you open the Security Groups screen, the deleted security group does not appear on the list.
Assign each user to a security group (or groups). For more information, see Assigning Users to Security Groups.