System Settings for Role-Based Security (RBS)

  1. To begin using Role-Based Security, an Epicor representative must activate it for you in Options Configuration. This activation occurs after you attend the Role-Based Security training session. You can sign up for the training session at Epicor's web conference center, www.activant.com/wcc.

  2. Assign security bits 760 and 761 to the users who will have access to Role-Based Security setup.

  3. If desired, set option 553 “Use Restricted Roles in Role-Based Security” to Yes in Options Configuration to create and control the assignment of  "Restricted Roles.”  Only managers with the highest security privileges can assign Restricted Roles to users. Roles that are not considered Restricted can be assigned by any manager who has security to manage Role-Based Security (bit 761).

When this option is set to Yes, use RBS Misc Menu option 4 "Maintain Roles" to indicate whether a role is restricted for assignment by entering a Y or N on the Restricted? field. Maintaining the Restricted? field requires security bit 1048 "Allowed to assign Restricted roles in Role-Based Security" and security bit 761 "Update Role-Based Security settings."