Online Library UX 365 Working with Security Roles | Page 2
Table of Contents
Overview .............................................................................................................................. 2
UX security roles ................................................................................................................. 2
About privileges and access levels ......................................................................................... 3
Privileges ............................................................................................................................. 3
Access levels ...................................................................................................................... 4
Access granted by UX security roles ....................................................................................... 5
CRM security roles required for UX setup ........................................................................ 10
CRM security roles required for customization................................................................. 10
Accessing security roles .................................................................................................... 10
Assigning security roles to a user ..................................................................................... 11
About creating new security roles ..................................................................................... 12
Copy an existing security role (recommended)..................................................................... 13
Create a new security role ..................................................................................................... 14
Modifying privileges and access levels for a new security role ........................................ 14
Updated: March 31, 2020
The content of this document is furnished for informational use only. It is subject to change without
notice and should not be construed as a commitment by Protech Associates, Inc. Protech Associates,
Inc. assumes no responsibility or liability for any errors or inaccuracies that may appear in this
document.