Welcome to Terminal-Based Security

Welcome to Terminal-Based Security. At the most basic level, security can be defined as controlling the access capabilities of those who use your Epicor. There are three levels of control in Terminal-Based Security: who, what, and where:

Terminal-Based Security works by having employees "sign on" when they begin work at a terminal, and then "sign off" when they have finished. When no one is signed on to a terminal, the default security set up in Modify Terminal Record (Function MTR) is active.

For each employee, you'll create a user record that tells the Epicor who the user is, what their password is (if you choose to set up passwords), and various other information about the user.

Where Do I Begin?

The easy-to-use online help system can assist you in finding out what you need to know about the Terminal-Based Security application. Look at the list of books on the left side of your screen. Inside the Terminal-Based Security book you'll find other books with information topics. Double-click a book to open or close it. The topic list displays when a book is open. Double-click a topic to display it on your screen.

To learn more about the online help system, open the Using Help and Other Training Resources book and then open the Using Online Help book. Read the topics in that book and you will find out more about navigating the online help system.

To start setting up Terminal-Based Security, open the Setting Up Security book and read the topics contained in that book.

If you have a question or need additional information you can contact Epicor Software Corporation™ (for example, you have a question for the Eagle Advice Line, or you'd like some product information from Epicor Direct ). Open the Using Help and Other Training Resources book and then open the Contacting Epicor book. There you'll find the information you need to get in touch with Epicor.

Trademark Information