Loading...
 

This section explains how to start working with coreBOS’ security settings. It's an overview of all types of considerations an administrator should go through before starting to set up the CRM system.

Role-based security has been provided to control who is allowed to browse, delete or update which information stored in the CRM. This is a significant improvement, making the CRM system more scalable, flexible, and easier to implement for larger corporations.

The following sections explain the role-based security concept as it is implemented by coreBOS and considers the dependency on other security settings.

With the help of this manual, you will get familiar with the security concept quickly. We will show you how you can configure the system to fit your needs and how to use it effectively. Please keep in mind that the security settings have been implemented to control users' privileges. It is especially suited for companies:

  • who would like to have a larger number of people to work with the CRM simultaneously

  • who would like to have restricted browse, delete or update capabilities for individual users

  • who would like to have a hierarchical order implemented 

 

 Please note:

The access to the Settings area is restricted to CRM administrators only. The settings area won’t be shown to standard users in the Log In Area.

 

To reach the Settings Page click on the  Settings button from the top right corner of any page and then in the CRM Settings menu that appears.

The main Settings Page in divided into four sections: Users and Access Management, Studio, Business Process Management, Other Settings, as shown in the figure. This guide will explain each section in detail.

 

    image        image

 

 Note

All samples for organizations or contacts used in this manual are imaginary. 
Any resemblances to existing companies or persons are coincidental.

 

Admin Manual
Developer Manual