-
Client Resources
-
EBMS Main Documentation
- Introduction
- Getting Started
- Getting Started | Initial Installation
- Getting Started | Company Setup
- Quick User Guide | Financial Staff | Accountant
- Quick User Guide | Financial Staff | Accountant | Accountants Journal
- Quick User Guide | Sales Staff
- Quick User Guide | General Staff
- Features
- Reports
- Reports | Excel Add-In
- Reports | Excel Add-In | Troubleshooting
- Security
- Server Manager
- Technical
- Technical | Data Import and Export Utility
- Technical | SQL Mirror
- Automotive
- Automotive | Parts Catalog
- Automotive | Pricing
- Automotive | Point of Sale
- Automotive | Product Application
- Automotive | Keystone Interface
- Metal Supply
- Fuel Sales
- Horticulture
- Horticulture | Farm Setup
- Horticulture | Processing Payroll
- Horticulture | Managing the Farm
-
Sales
- Introduction
- Customers
- Customers | Miscellaneous Customers
- Proposals
- Proposals | Processing Proposals
- Proposals | Sets and Templates
- MyProposals
- MyOrders
- Sales Orders
- Invoices
- Materials Lists
- Sales and Use Tax
- Sales and Use Tax | TaxJar
- CRM
- CRM | Auto Send
- Recurring Billing
- Credits
- Customer Payments
- Payment Card Processing
- Payment Card Processing | Gift Cards
- Payment Card Processing | Loyalty Cards
- Payment Card Processing | Verifone Gateway
- Freight and Shipping Tools
- General Ledger Transactions
- Point of Sale
- Point of Sale | Point of Sale Hardware
- Point of Sale | Xpress POS System
- Point of Sale | Advanced Tools
- Signature Capture
- Salesperson Commissions
-
Inventory
- Product Catalog
- Product Catalog | Using Product Codes for No Count Items
- Product Pricing
- Product Pricing | Special Pricing
- Tracking Counts
- Unit of Measure
- Purchasing
- Special Orders and Drop Shipped Items
- Receiving Product
- Barcodes
- MyInventory and Scanner
- Components (BOM) and Accessories
- Components (BOM) and Accessories | Component Formula Tool
- Made-to-Order Kitting
- Configure-to-Order Kitting
- Multiple Inventory Locations
- Multiple Inventory Locations | Creating Locations
- Multiple Inventory Locations | Using Multiple Locations
- Multiple Inventory Locations | Product Catalog Sync
- Multi-Vendor Catalog
- Serialized Items
- Serialized Items | Purchasing or Manufacturing an Item
- Serialized Items | Selling and/or Associating an item with a customer
- Lots
- Product Attributes
- Product Attributes | Selling and Purchasing Items with Attributes
- Product Attributes | Custom Attributes
- Mobile Scanner (Legacy)
-
Labor
- Getting Started
- Workers
- Taxes and Deductions
- Work Codes
- Time and Attendance
- Time and Attendance | Time Track App
- Processing Payroll
- Closing the Payroll Year
- Processing Payroll - Advanced
- Salaried Pay
- Piecework Pay
- Direct Deposit
- 3rd Party Payroll Service
- Subcontract Workers
- Flag Pay
- Prevailing Wages
- MyDispatch
- MyTasks
- MyTime
- MyTime | Communications
- MyTime | Setup
- Tasks
- Tasks | Getting Started
- Tasks | Creating Tasks
- Tasks | Scheduling Tasks
- Tasks | Customizing Task Views
- Tasks | Managing Tasks
-
Financials
- Introduction
- Fiscal Year
- Chart of Accounts
- Budget
- Financial Reporting
- Transactions and Journals
- Transactions and Journals | Journals
- Account Reconciliation
- 1099
- Departments and Profit Centers
- Fund Accounts
- Bank Accounts
- Bank Feed
- Vendors
- Vendors | Miscellaneous Vendors
- Purchase Orders
- Expense Invoices
- Vendor Payments
- AP Transactions
- Landed Cost
- Fixed Assets and Depreciation
- Fixed Assets and Depreciation | Fixed Assets
- Fixed Assets and Depreciation | Fixed Assets | Adding Assets
- Fixed Assets and Depreciation | Processing Depreciation
- Fixed Assets and Depreciation | Disposing Assets
- MyJobs
-
E-commerce
-
Rental
-
Job Costing
-
Manufacturing
Setting Report Security
An important EBMS data security consideration is to limit users access to reports. Reports can be secured by either of the following methods:
-
Blocking the user from the entire report: This common method is used to block certain users from having any access to a specific report.
-
Limiting a user's ability to change default prompts: Review the Prompt Security section below.
-
Customizing a report that removes sensitive information after verifying that another existing standard report does not contain the secure information: Review Reports > Report and Form Customization for instructions.
Database data field security settings explained in the previous section do not affect reports. For example, a secure field within a report will not be hidden because the user is barred from the field. The entire report must be secure to protect data within the report. Report security is set within individual reports.
Report Security
Go to File > Reports and select a report. Click on the Properties button to open the following dialog:
All users with permission levels that are included in the list on the left side of the dialog will be able to print the current report. All others listed on the right side of the list will not have access to the report. Use the Disallow and Allow buttons to move user permission levels to/from the Users allowed to print this report list and the Users NOT allowed to print this report list.
The user's security level for the specific report is determined by the first two initials of a the report path. For example, the Report Path shown above is prefixed with the IN initials which links the report security to the Inventory security settings. Some other prefixes used by report security is as follows:
-
GL - General Ledger
-
AP - Expenses (Accounts Payable)
-
AR - Sales (Accounts Receivable)
-
PY - Payroll
-
TA - Tasks
Prompt Security
A user can be restricted from changing report prompts in the following ways:
-
Set security settings for all prompts
-
Set security settings for individual prompts
Complete the following steps to restrict a user's ability to change a prompt:
-
Open a report and click on the Print and Print Preview button to open the report prompt.
-
Right click on the report title (A) or individual report prompts (B) and select Set Security from the context menu as shown above:
-
Set the desired security level for this report prompt. Do not use the View Parent button settings for reports. Review Setting Security for a Tab, Entry Field, Button, or Process for instructions on the following security settings.
-
Click OK and repeat for any other report prompts.
-
The users must restart EBMS for the report security to be valid.