Book Image

Integrating CRM across your Organization for Business success

By : Andrew Blackmore
Book Image

Integrating CRM across your Organization for Business success

By: Andrew Blackmore

Overview of this book

Table of Contents (14 chapters)
Integrating CRM Across Your Organization for Business Success
Credits
About the Author
About the Reviewer
Preface

Security


ERP invoices will now be viewable in CRM to CRM users. By default, they may have no security restrictions, or they may inherit the security of the customers with which they are associated. We need to consider if additional security restrictions need to be added.

Some approaches to restricting the invoice data that is shown to your users include:

  • No restriction: If there is no security, all your CRM users will have access to all the invoices that are synchronized to CRM. This may be acceptable in some implementations.

  • Restricting based on customer: Invoice security can be implemented to inherit the security permissions of the customer with which they are associated. If a CRM user has permission to view a customer, they will also have permission to view the invoices for the customer.

  • Restricting based on user role: Invoice security can be implemented so that, for example, only users with a sales role or a support role can view them.

  • Restricting based on customer and role: Invoice security...