ERP Internals/Data Tables/User

This group of tables control who can log on to the company and what functions they can perform. Each user can be assigned one or more roles (such as Purchasing Agent) which gives them access to a variety of functions. This allows the Systems Administrator to define a limited set of roles and allocate those roles to a large group of users. In smaller enterprises, the Systems Administrator would simply assign functions to each user directly.

The contents of these tables are encrypted to increase security.

User

edit

This table contains one record for every user that can log into this company.

Used by: Every function in every module

Key: User Number

Fields:

  • User Number (a unique number assigned by the ERP package)
  • User Name
  • User Password
  • Password Expiry Date
  • Minimum Password Length
  • Inactive (Yes/No)
  • Employee Number
  • Language
  • Notes

Role

edit

This table contains one record for each role.

Used by: Every function in every module

Key: Role Number

Fields:

  • Role Number
  • Role Description
  • Notes

User Role

edit

This table contains one record for each role each user has.

Used by: Every function in every module

Key: User Number, Role Number

Fields:

  • User Number
  • Role Number

User Access

edit

This table contains one record for every function the user can perform in this company. Although this is how the data is stored, the ERP uses a more compact format for efficiency reasons.

Used by: Every function in every module

Key: User Number, Function Number

Fields:

  • User Number
  • Function Number
  • Type of Access

Role Access

edit

This table contains one record for every function the role can perform in this company. Although this is how the data is stored, the ERP uses a more compact format for efficiency reasons.

Used by: Every function in every module

Key: Role Number, Function Number

Fields:

  • Role Number
  • Function Number
  • Type of Access

Functions

edit

The ERP package has pre-defined tables that list all the possible functions that can be performed as well as all the types of access.