Overview of Security Roles

There are two key areas of security with IRIS Financials. Access levels are the simplest way to assign security - any user who belongs to a group with that access level or higher can access data assigned to that level. Access levels focus on the accessibility of data.

Security roles are used to restrict access to the ways in which the data can be maintained, i.e. whether data can be viewed, modified, or posted. If no security roles are applied, all users (providing they have the applicable access levels for the data) can carry out all these functions.

A variety of security roles have been applied as part of your system implementation. They consist of a code and title. Once created, the security roles are then assigned to user groups.

user-group-maintenance-security-role-list.png

Once security roles have been created and assigned to user groups, by editing the properties of ledgers, nominals, or accounts, you can select an applicable security role to restrict who can view, modify, or post data. Any users who do not have the defined security role, are not able to carry out that function.

It is important to note that access levels give access to data, and security roles restrict access to data. If you do not apply security roles, then everyone with the applicable access level can view, modify, or post data.