Compiere ERP is equipped with power-packed security features such as application-level security infrastructure, roles support, data security, data encryption, and auditing. These efficient security options help you to apply security policies which can be defined without programming. This will safeguard your business information from unauthorized access and enable your employees to do their tasks very effectively.
Compiere ERP Role-based Security
Each Compiere ERP user has a separate user account. One or more roles are associated with each user account by defining what data and functions it contains. Once logged in, Compiere ERP get the role information and display the menu of application functions, windows and reports that are applicable to the user.
The Compiere ERP system involves an inheritance-based model for granting or revoking user privileges based on the role assigned. You can assign common roles for the whole enterprise or specific to an organizational unit within an enterprise.
Examples of Role-based security policies
- All can view the end-user price list in an enterprise.
- CFO has the full privilege to update the Chart of Accounts (CoA).
Data Security in Compiere ERP
When comparing the role based-security of Compiere Community Edition with Compiere ERP Professional Edition, Enterprise Edition has more robust data-level security features. This restricts access to specific data records or fields with respect to the role-based information.
Examples of Data security policies
- Restrict sales representatives from seeing sales order data from outside.
- Allow accounts payable staff to process orders from all regions, but cannot change price.
You can automate internal controls using precise access rules, makes sure proper governance reviews and appropriate segregation of duties for transactions.
Auditing
An added security feature in Compiere ERP is the capability of auditing any transaction in the system, along with the updates done in the application metadata. Ex: The changes done by an administrator on user’s role, new security policy, new field on an order screen, new transactions, changes to existing data, queries of specific records & fields can be tracked using audit log.
Controlling restrictive or open security policies are in your hand