Online Library UX 365 Working with Security Roles | Page 2

Table of Contents Overview .............................................................................................................................. 2 UX security roles ................................................................................................................. 2 About privileges and access levels ......................................................................................... 3 Privileges ............................................................................................................................. 3 Access levels ...................................................................................................................... 4 Access granted by UX security roles ....................................................................................... 5 CRM security roles required for UX setup ........................................................................ 10 CRM security roles required for customization................................................................. 10 Accessing security roles .................................................................................................... 10 Assigning security roles to a user ..................................................................................... 11 About creating new security roles ..................................................................................... 12 Copy an existing security role (recommended)..................................................................... 13 Create a new security role ..................................................................................................... 14 Modifying privileges and access levels for a new security role ........................................ 14 Updated: March 31, 2020 The content of this document is furnished for informational use only. It is subject to change without notice and should not be construed as a commitment by Protech Associates, Inc. Protech Associates, Inc. assumes no responsibility or liability for any errors or inaccuracies that may appear in this document.