ERP Internals/Data Tables/User
This group of tables control who can log on to the company and what functions they can perform. Each user can be assigned one or more roles (such as Purchasing Agent) which gives them access to a variety of functions. This allows the Systems Administrator to define a limited set of roles and allocate those roles to a large group of users. In smaller enterprises, the Systems Administrator would simply assign functions to each user directly.
The contents of these tables are encrypted to increase security.
User
[edit | edit source]This table contains one record for every user that can log into this company.
Used by: Every function in every module
Key: User Number
Fields:
- User Number (a unique number assigned by the ERP package)
- User Name
- User Password
- Password Expiry Date
- Minimum Password Length
- Inactive (Yes/No)
- Employee Number
- Language
- Notes
Role
[edit | edit source]This table contains one record for each role.
Used by: Every function in every module
Key: Role Number
Fields:
- Role Number
- Role Description
- Notes
User Role
[edit | edit source]This table contains one record for each role each user has.
Used by: Every function in every module
Key: User Number, Role Number
Fields:
- User Number
- Role Number
User Access
[edit | edit source]This table contains one record for every function the user can perform in this company. Although this is how the data is stored, the ERP uses a more compact format for efficiency reasons.
Used by: Every function in every module
Key: User Number, Function Number
Fields:
- User Number
- Function Number
- Type of Access
Role Access
[edit | edit source]This table contains one record for every function the role can perform in this company. Although this is how the data is stored, the ERP uses a more compact format for efficiency reasons.
Used by: Every function in every module
Key: Role Number, Function Number
Fields:
- Role Number
- Function Number
- Type of Access
Functions
[edit | edit source]The ERP package has pre-defined tables that list all the possible functions that can be performed as well as all the types of access.