User Level Security
Table of Contents
Setting up Users
This is done from the Utilities > Global > User Level Security.
Basic: Adding a New User - User Security is not required
NOTES:
- If you only need to keep other users completely out of a system, use the password option found on the Maintenance screen in General Ledger and Payroll. Each set of books and major system can have its own password. However, be careful! If those passwords are lost or forgotten, they cannot be easily recovered.
- The user will be denied any access to that company after three unsuccessful attempts.
Click on Add to add users.
User ID | Enter the user ID and Name, typically their initials. It can be 1, 2, or 3 characters - alpha-numeric field. NOTE: The following characters are not allowed in the UserID: [.'\','/',':','*','?','"','<','>','|']) |
User Name | Full name of the user. |
Optional | |
Classification | Classification is used with multiple posting dates; if not using multiple posting dates, keep all users at Class 1). There can be 3 different classes if desired. This will require 3 different posting dates. Determine which users you want to be in each of the three classes and define them in their individual user-level security. Also, make sure that the posting dates for each class are defined in the Posting Allowed Date Range. |
Restrict Signon to Network User Name | Optional Restrict Sign on to Network User name—This option restricts the Pak Accounting User ID to the Network user. If a network User ID is specified and the option is checked, then only a user logged into the specific workstation with that network ID can log in to Pak Accounting with this Pak Accounting user ID. |
Active/Expiration Date | Uncheck this box if the user is no longer with the company. This is preferred over deleting the User ID so that historical change logs will remain intact. Add an Expiration Date if desired. This is helpful if the user will not be leaving the company right away. Once unchecked, if the User Id is used, there will be a message “The access for User: ”Name Here" has expired." |
Phone Extention | Optional |
Password not Required |
Check the box to not require a password to be entered for this user. The user just enters the user ID to get into Pak Accounting.
If a password is desired, leave the box unchecked, the password will be entered the first time the user goes into Pak Accounting. If a manager desires to set a password for a user, simply log in as that user and set the password. |
Days Before Password Resets | If a user forgets their password, the manager (user with Full access) can select the this button, and the User |
Reset Password | This field is optional. Entering a number will turn on the feature (0 keeps the feature turned off; the password will not expire). Set the number of days that the system will require the User to enter a new password (i.e., the prior password will expire). |
Advanced: Turning on System Security
In addition to the above information, the following will need to be set up.
Step 1: Setting up the individual users.
Step 2: Enabling the security system: System Options.
WARNING! Make sure you have the users set up (step 1) BEFORE you enable the global security option (step 2)! If you do step 2 first, there will be NO authorized users -- including yourself -- and everyone will be locked out. Make sure you have a user authorized for everything, specifically the global file that sets up Security.
User Access Management Best Practices
The recommended best practice involves a counterintuitive but effective strategy: initially granting full system access and then methodically removing unnecessary specific permissions. This approach ensures a comprehensive initial setup before fine-tuning individual user capabilities.
- Start with full system permissions
- Progressively remove unnecessary access rights
- Verify permission restrictions through systematic testing\
- To test permissions - the one who set the permission has to close out of the User Security menu. The user who is being restricted will need to log out of Pak and log back in.
- Regularly audit user access settings
To effectively restrict user access, administrators should:
- Review all available permission levels
- Disable specific module and function permissions
- Confirm access limitations through test accounts
- Document each access modification
By following these strategic guidelines, organizations can create a robust and secure user access framework within their accounting system, minimizing potential security risks while maintaining operational flexibility.
Default Access Level |
Enter the level most used by this user. This can be overriden at the company level.
|
View/Change Sub-Account Tax ID |
|
View/Change Owner Bank Account: select one of the four options for each user |
|
By Company Security Tab |
This tab allows you to set security at a company level. *ALL* is automatically added once you save the User ID to allow you to set user access for all companies on Pak Accounting.
NOTE: If a user has access to only certain companies, they will only have access to these in company lookups. |
NOTES for User Security:
- If user-level security has been enabled and a user does not have access to a specific company, that company will not appear in the company drop-down list when that user logs in.
- A user cannot delete their own security account or remove their own ability to get into security maintenance.
- Right-clicking in the bottom half of the Security Maintenance screen and choosing List User/Company Access provides a Security Master Listing for one user or range of users, along with the options to print security for one or all companies and overridden details.
Edit Company Level Access
Double-click on *ALL* (or individual company if set up) to edit the company-level access
Edit Security for Modules and Menues
Once at the company level, set user access by individual screens within each system.
- Click on the Expand All or + button to expand the menu.
- To collapse the menu, click on the Collapse All or—button.
- Double-click on an item to bring up a pop-up box and specify the level of security for the current item. See the example below.
- Notice the outline is the same as the menu tree in Pak.
- Changing the security will change all sub-categories under the header by default. However, you can expand the header and set further security at the menu level.
Edit Security for Accounts, Bank Codes and Journals
You can also restrict access by Account, A/P Coding Accounts, Bank Code, or Journal at the company level. Under Restrictions, double-click on the category and then select the items to restrict access.
- This is only available on the individual company-level setup. Not on the *ALL* company level setup
- The intent of restrictions is to limit viewing/reporting, not coding or input.
-
If it is necessary for a particular user to not view certain account(s), simply choose the account(s) in the View Accounts restriction and use the red/blue arrows (the red arrow will move one account at a time; the blue arrow will move all accounts) to move them to the right side of the Accounts Selection screen, and then save. When that user logs in, they will not be able to view the selected accounts in View Trend (F4), run a ledger listing, or view the restricted accounts in a journal listing. The user will be able to make an entry in General Ledger Entries or, if the restricted account is a cash account, choose that account to pay an A/P invoice.
- The A/P Coding Accounts restriction allows for selected accounts to be restricted for coding A/P invoices.
- The Bank Account restriction limits viewing to bank codes chosen to be excluded. The user will not be able to view a check register, export a positive pay file, or view cash disbursements for the excluded bank codes.
- If selected journals are restricted, the user will not be able to view a journal listing for those journals. View Trend (F4)/View by Account level will blackout the detail on the part of the entry that pertains to the restricted journal. The "Detail by Journal" level will only allow the user to view the part of the entry that does not pertain to the restricted journal. The ledger listing will let them view the total amount for an entry that is restricted but will include a restricted entry on the ledger listing for the journal that is restricted.
- The Sub-Tables restriction will allow the user to see the name/address only of the Sub-Accounts within the restricted Sub-Table(s). The security is consistent with the fields displayed within the lookup function.
-
Directly underneath the Restrictions menu is the Permissions menu. The permissions menu allows a user to have permissions for certain functions only regarding Account, Time Entry, Number Master, and Journal Entry.
NOTE: The intent of permissions is to allow a user to have a certain capability.- The Account permissions allow the user to enter an account. The Account(s) that are moved to the right side of the screen via the red/blue arrows are the accounts that the user will have access to.
- The Time Entry allows the user to enter time for selected employees. The employees moved to the right side of the screen via the red/blue arrows are the employees to whom the user will have access to enter time.
- The Number Master Permission allows selected System IDs (modules) to be accessed in regard to the next number assignment. found in the Utilities module/Next Number Assignment. This is accomplished by moving the modules to the right side of the screen, where the user is allowed to change the next number assignment.
- The Journal Entry Permission allows the user to access selected journals for journal entries by moving them to the right-hand side of the screen using the red/blue arrows. This allows the user to make entries to the selected journals.
NOTE: Right-clicking on the User Security Maintenance screen will provide a list feature that shows the security listing, or tree, for that particular user.
Edit Security for View Trend
View Trend is divided into three screens: Summary, Detail by Account, and Detail by Journal. The ability for a user to view or not view either of these screens is determined by this one setting:
If a user can view the [F4] view screen, the security on the Real-time change functions of both the Detail by Account and the Detail by Journal screens is based on the user's access to the Unpost Entries screen (General Ledger > Manual Entries > Unpost Entries).
List
The security listing provides information about each user's security settings, including the date the security originated and any changes.
Utility
Utility to copy one user's security settings to another user.
- Can copy from a user in another company. This utility will also copy company-level security to another company for the same user.
- Ticket Security.
- Check Approval.
Also see: Alerts