返回列表 发帖

ACT! Security Model 2

ACT! Security Overview


The ACT! security model supports both stand-alone and workgroup implementations. Security in ACT! can be scaled to suit your environment, whether you work alone, with a small team, or with a large workgroup1. Security can be enforced at the database level, the feature level, the record level, and the field level.

User Roles
The five user roles in ACT! are:


Administrator• – Administrator is the highest level role in ACT!. Users with this role can access all features in ACT!, and all records that have public or limited access. Only private data owned by other users is inaccessible to the administrator. (For more information about record access, see Lookup Contact by Access on page 18) The administrator is the only role allowed to Manage Users, Delete database, and set the Password Policy. Users who are responsible for maintaining the database and who need to access most features and data, should be administrators.


Manager• – Managers have access to all features except Manage Users, Delete database, and Password Policy. The manager role can be tailored for individual needs by granting or withholding four custom permissions. Managers have access to all public records. Users who need to Manage Teams, modify database schema, manage records owned by other users, create/edit layouts, import/export data, manage custom activity types, or update product information, should be managers.


Standard • – The standard role represents the typical user. Users with this role can access most areas of the application, create/edit any record to which they have access, and delete records that they own. Standard users can access only public records and their private records. The standard role can be tailored for individual needs by granting or withholding six custom permissions. Users who perform a variety of tasks, including creating/modifying word-processing and report templates, but who do not need to modify or maintain the database, should be standard users.


Restricted• – Restricted users can access only basic functionality. Users with this role can create/edit contacts, activities, notes, history, and opportunities, but cannot create or edit groups or companies. Restricted users can run reports and write letters using existing templates, but they cannot modify letter or report templates. Restricted users can only access public records and their private records. In addition, users with this role cannot delete any records, even records they own. Typically, restricted users are assistants, hourly workers, or others requiring only limited access to features in ACT!.


Browse• – The browse role gives users read-only access to information in the ACT! database. Browse users can perform lookups, run reports, and print information, but cannot create or modify any data in the ACT! database. Temporary employees and users who only need to reference information should be browse users.

返回列表