How to configure Sage 300 Security
ERP Security is vital in ensuring protection for your company’s data and information systems. In this post, we’re going to cover how to configure Sage 300 security. Sage 300 security can be configured in multiple ways. It can be setup by creating user roles and assigning roles to users. In addition, each form can be customized to hide specific fields, which can be attached to the user’s profile.
In this blog, we will identify the interesting security features of Sage 300.
Login Window
When logging into a company within Sage 300, you may use the standard Sage 300 UserID and password. If your company allows, you may also use your Network log in by selecting Windows Authentication and providing your Domain and Network ID.
User Profiles
Some user specific restrictions can be enabled upon creating the user profile. It can be restricted as to specific days of the week, as well as time range. With this, users having such configurations will only be allowed access as specified in the profile.
Global Security
The Global Security Settings can be accessed from the Security button in Database Setup.
There are several options that can be enabled to comply with your current company security policies.
Security Groups
Security Groups are often used to create User Roles to identify specific tasks that a group of users can perform. In Sage 300, the Security Groups are created for each Module. Thereafter, each user is assigned specific Security Group for each module using the User Authorizations.
Customize UI Profile
In addition to the security access rights restrictions applied in the Security Groups, some specific fields need to be taken out from the form to either simplify the user experience or provide further security. At the base of the form, right click and select File>Customize.
This will open the Customize window which will allow you to remove certain fields.
After saving the appropriate restrictions to a working profile, the particular profile is later linked to the User ID.
Note that all security configurations discussed above will only have an effect if the Database Security is enabled in the related System database. The System database holds security data, thus, the same security settings are applied to all companies attached to the same System database.