If the predefined security roles do not meet the needs of your organization, you can always create new ones.
Click Tools, Security, Roles and the Roles window appears.
Click Edit, Insert New (or press F3) to get an empty line on which to create the new group.
In the Role ID field, enter an ID for the new role.
In the Name field, enter a description of the new role.
Press Enter or click the next line to accept the new role.
Click the new role again.
Click Role, Permissions and the Permissions window for this new role appears. Because this is a new role, the window will be empty.
In the Permissions window, you can use the AssistButton in the Object Type field to select the type of object that you want to grant permission for and then the specific instance of that object. Enter Yes under the permissions you want to assign to the role (for example, Read), or select Yes with the help of the AssistButton to the right of the field. These permissions will then be granted to the new role.
Alternatively, if you want to grant the role extensive permissions, you can click All Objects at the bottom of the window. A list of all the objects in the application appears.
If you click All Objects, the Permissions (All Objects) window appears. Enter Yes in the fields for the permissions you want to give the role, or select Yes with the help of the AssistButton to the right of the field. When you click OK in the Permissions (All Objects) window the lines marked Yes will be copied to the Permissions window for this role, where you will subsequently be able to see them.
If you select Table Data in the Object Type field, you can also apply a security filter. In the Security Filter field, click the AssistButton and use the standard table filter window that appears to specify the filter. The security filter will limit the permissions that this role has to data about specific customers, vendors and so on.
For information about setting up Profiles in the RoleTailored client, see the topics "Creating a Profile" and "Assigning Profiles to Users" in the documentation for the RoleTailored client.
Creating Database Logins
Creating Windows Logins
Giving Roles to Database Logins
Modifying Permissions for Roles
Limiting Roles to Specific Companies for a Login
Applying Security Filters