Security: Role-Based vs. Terminal-Based  

There are two types of security on your Epicor Eagle system: Role-Based and Terminal-Based. Role-Based Security is new as of Level 15 Eagle for Windows. Epicor™ recommends that all new systems use Role-Based Security due to its ease of setup and maintenance. If you do not have a new system (your system was installed prior to Level 15), you can change some or all of your users (employees) from Terminal-Based to Role-Based if desired. Moreover, you can have some employees with Terminal-Based security, and others with Role-Based security.

Role-Based Security users have the same capabilities at all terminals in a store. These capabilities are defined by the role(s) you assign to that user. Roles are simply a group of capabilities. You can use pre-defined security templates to create roles, and you can also add individual security bits to roles. For example, you might create a role using the POSCLERK template, and also add other security bits to the role. Or, you might create a role entirely from scratch, without using a template. The beauty of Role-Based Security is, if you add or subtract bits from a role, the change affects all users that are assigned to that role.  

Terminal-Based Security  is the traditional version of security that all systems used prior to Level 15 Eagle for Windows. Terminal-Based users are set up with specific capabilities at specific terminals. This means a given user could have different capabilities at different terminals in the store. When assigning security to users, you can use pre-defined security templates, and you can also assign individual security bits. Oftentimes you may use a combination of both methods; for example, you might copy the template POSCLERK to a POS clerk, but also assign the clerk certain other security bits that they will need. Unlike Role-Based Security, adding or subtracting bits with Terminal-Based Security is done on a user-by-user (and possibly terminal-by-terminal) basis.