Summary
In this chapter, we have learnt how to implement security in ADempiere. We started with a discussion on how to create a new user ID in the system. With the new user ID available, we assigned a role.
When creating the role, we explained the important options, such as accessing all organizations, maintaining a change log, and showing accounting and other available attributes. We continued these activities and saw examples of how to grant access to the Info Window, Window, Process Access, Document Action Access, and Form Access.
We elaborated on how to restrict access to a certain record, and introduced you to table, report, export, and column access configuration. Finally, we showed you how ADempiere obscures information.
You now have a basic knowledge of how to implement ADempiere in your organization. We encourage you to join the ADempiere community and share your experience of using ADempiere on our forum. Visit us at http://www.adempiere.org and http://www.adempiere.com to learn more...