32

Symphony Pro User Manual 2.0.2.15

3.1.8.8Security

Security Tab Settings

Security System Overview

The Symphony Pro Software offers a security level system to restrict access to most functions, database tables and configuration type information. In some situations, such as a single owner- manager Symphony POS / Symphony Pro setup, or if the PC that runs the back office is in a locked room, you may not need to use the security system. In most cases however, the PC station that runs Symphony Pro (or networked Symphony Pro stations) is accessible to any passer-by. This means that your data and system configuration is open to possible damage.

The security system is based on access levels that are assigned to users. There are eight (8) levels, starting with level 0, called "no user", up to level seven (7), called "programmer". Assigning the "no user" level to an option or utility means that anybody can access it. Once a security level is assigned to a function, option or data table, the system verifies the logged in user to make sure that they have access rights. If the user does not have access rights, the system opens a login panel.

Below is an example of how the security levels might be set.

Level 0: No User - locked, the default security level when Symphony Pro is launched

Level 1: New User - able to access certain tables only, for example items, departments etc.

Level 2: Cashier - access to items, departments and other functions that a cashier would require

Level 3: Clerk - receive, modify, view certain reports

Level 4: Assistant Manager - access and modify items, departments. Access to reports

Level 5: Manager - Access, Modify, Add / Delete, no access to network and programming features

Level 6: Owner - Access, Modify, Add / Delete all except programming features

Level 7: Programmer - complete access

Essentially, there are two steps to follow to implement the security system:

·First: Establish the minimum security level required to access each of the system functions, options, data tables, and configuration files listed in the Security Tab of the Configuration Panel.

·Second: Associate each operator in the operator table with a security level.

Remember that this is the MINIMUM level required. A user with a higher access level has access to all levels below.

Establishing access levels

The System tab displays a list of data tables, utilities and setup information. The list has four (4) columns:

Column 1

- the name or description of the option to protect.

Column 2

- "Access" - the minimum security level required to access the option.

Column 3

- "Modify" - the minimum security level required to change data or settings.

Column 4

- "Add / Delete" - the minimum security level required to add or remove data.

© 2005 TOSHIBA TEC AMERICA AMERICA RETAIL SYSTEMS, INC. R1.0a

Page 34
Image 34
Toshiba Electric Keyboard owner manual Security Security Tab Settings Security System Overview, Establishing access levels