Welcome to our comprehensive guide on Sage Intacct's system security, focusing on user roles, permissions, and administrative privileges. This article will provide you with a high-level overview of how to configure and optimize security settings within your Sage Intacct system.
Global Security Settings
Starting with global settings, Sage Intacct allows you to establish security at either a user or role level. To access these settings:
- Navigate to Company Setup.
- Select Company and click Edit.
- Scroll down to Global Settings to find permission type options, which can be set to either user-based or role-based. We recommend the latter for its efficiency in managing permissions.
Note: Role-based security helps to avoid redundancy and simplifies the permission assignment process.
User Types in Sage Intacct
Understanding user types is crucial for setting up appropriate access levels. Sage Intacct supports six user types, with the focus on the following three:
- Business Users: They have comprehensive access to the system, including data entry, processing, posting, and report access. Admin privileges can vary among business users.
- Employees: Their capabilities are limited to viewing reports and dashboards, and managing timesheets, expenses, and purchase requests.
- Project Managers: Available with a projects subscription, they have elevated permissions compared to employees, particularly with project data interaction.
For a more detailed explanation of each user type, Sage Intacct provides a help file and a knowledgebase article accessible through the user interface.
Admin Privileges
Admin privileges are typically associated with business user types. A business user with full admin privileges has complete control over the system, including configuration and user management. The 'Try Role' feature allows admins to test roles and permissions.
Roles and Permissions
Roles define what users can do within the system. To manage roles:
- Go to Applications > Company Admin > Roles.
- Here you can edit existing roles or create new ones tailored to your company's needs. It is essential to leave the default admin role untouched.
Each role allows you to set specific permissions for applications and features within Sage Intacct. Permissions can be granular, down to the ability to view, add, edit, or delete records.
Assigning Roles to Users
The final step in configuring security is to assign roles to users:
- Return to Company Admin > Users.
- Edit a user record and assign the appropriate role under the roles information tab.
By following these steps, you can ensure that your users have the correct level of access to perform their job functions securely and efficiently.
Conclusion
In summary, Sage Intacct provides a robust framework for setting up system security through user roles and permissions. By carefully configuring these settings, you can maintain a secure and orderly environment that aligns with your business needs.