Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Integrating CRM across your Organization for Business success

You're reading from   Integrating CRM across your Organization for Business success Build your business processes around the needs of your customers by successfully integrating your CRM within your core business functions to drive improvement

Arrow left icon
Product type Paperback
Published in Jan 2016
Publisher Packt
ISBN-13 9781783001040
Length 180 pages
Edition 1st Edition
Concepts
Arrow right icon
Author (1):
Arrow left icon
Andrew Blackmore Andrew Blackmore
Author Profile Icon Andrew Blackmore
Andrew Blackmore
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Integrating CRM Across Your Organization for Business Success
Credits
About the Author
About the Reviewer
Preface
1. What is CRM Integration and Why is It Good for Your Business? 2. How to Implement an Integration FREE CHAPTER 3. How to Build a Contact Integration 4. How to Build a Sales Management Integration 5. How to Build a Collections Management Integration 6. How to Build a Vendor Management Integration 7. How to Build a Support Management Integration 8. How to Develop and Maintain Your Integration 9. Where Next for Integrations – the Cloud and Other Areas

Security


ERP invoices will now be viewable in CRM to CRM users. By default, they may have no security restrictions, or they may inherit the security of the customers with which they are associated. We need to consider if additional security restrictions need to be added.

Some approaches to restricting the invoice data that is shown to your users include:

  • No restriction: If there is no security, all your CRM users will have access to all the invoices that are synchronized to CRM. This may be acceptable in some implementations.

  • Restricting based on customer: Invoice security can be implemented to inherit the security permissions of the customer with which they are associated. If a CRM user has permission to view a customer, they will also have permission to view the invoices for the customer.

  • Restricting based on user role: Invoice security can be implemented so that, for example, only users with a sales role or a support role can view them.

  • Restricting based on customer and role: Invoice security...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image