This chapter explains on examples how role based security and the other security settings can be used to manage the CRM system.
From the technical point of view, user administration means the administration of permissions. Essentially, the use of role-based security settings depends on the number of users and the company structure. Few users in small enterprises have few requirements to a permission administration. With an increasing number of users the complexity of the relations between the users increases and usually it develops the need to assign and administer individual user permissions.
The CRM system offers a privilege system that is based on the following simple looking rules:
At the CRM system permission assignment primarily means the withdrawal of permissions. In the practical work with the CRM, this is most helpful and necessary as the following examples illustrate:
Therefore, it is necessary that the user permission assignment is truly based on business requirements as described in the following examples:
Considering the CRM system capabilities of managing user permissions you should configure your system in the following order:
Single users do not need any permission management. They have and need all permissions to access and to change all data stored at the CRM. Nevertheless, it is helpful to know the basics of role-based security assignments. This might be needed if additional users will be required in the future.
Never use the “admin” role for your daily work with the CRM system. It is advised to create individual users instead. Later, if you want to delete a user, you can assign all data to a new user.
A small number of users, who use the CRM system together, should be familiar with the simple solutions offered by the role-based security assignment. That includes especially:
In a small organization, there is usually no pronounced hierarchy between coworkers. A complex permission administration does not have to be developed. However, if it should be necessary to granulate the permissions more finely, you should begin with the use of profiles. Each individual user may get its own role with a certain profile.
To provide a larger number of users within an organization with different user rights, a clear structure of the permission assignment is necessary. The CRM is powerful enough to mirror the job-related permissions of most hierarchical structures of companies.
Next | Examples
© 2006 crm-now