Setting up Role-Based Security consists of the following elements:
View the Role-Based Security pre-recorded training session. Register here. Once you have viewed the training, an Epicor representative will activate Role-Based Security for you.
Giving the appropriate users access to the Role-Based Security setup screens
Adding a User Record for each user (if you were previously using Terminal-Based security, you don't need to add users who are already in the system)
Creating Roles from templates or from scratch