In order to bring you the best possible user experience, this site uses Javascript. If you are seeing this message, it is likely that the Javascript option in your browser is disabled. For optimal viewing of this site, please ensure that Javascript is enabled for your browser.
Login  |   On Demand  |   Home  |

System Security
This section describes security in QAD Customer Relationship Management (QAD CRM). It discusses the following topics:
Explains the functions of QAD CRM security.
Explains how different types of security work, with sections on login security, business units, teams, and permission groups.
Security Relationships
Explains the relationship between users and system functions.
The security model used by the QAD CRM system controls who can access the system and defines the actions that users defined in the system can perform.
Using system security features, you can configure system login behavior, create and maintain users, teams (roles), and permission groups, and specify user access to business units. Using a combination of these security-related features, you can control user access to system menus and functions.
Using login security features, you can secure your system from unauthorized users. You can also configure additional types of security that provide enhanced protection for individual database records.
Note: If you intend to use QAD Enterprise Applications with QAD CRM, a system administrator must configure security for the ERP application separately. For details, see User Guide: QAD Security or User Guide: Manager Functions, depending on your version of QAD Enterprise Applications.