Roles & Permissions
User security roles determine:
- The areas of the application (such as the Contacts menu or Tools menu) that a user can access.
- The tasks (such as adding contacts or running reports) the user can perform.
The five user security roles are: Administrator, Manager, Standard, Restricted, and Browse. Give users the role that lets them access only the functions they need to perform their job.
Permissions allow users with a Standard or Manager role additional access to features and the ability to perform special tasks.Administrator - Is the highest level role in Act!. Users with this role can access all features, and all records that have public or limited access. Users who are responsible for maintaining the database, ensuring data security, and adding or deleting users, should be Administrators.
Manager - Has access to all features except Manage Users, Delete database, and Password Policy. The Manager role can be expanded by adding or removing permissions for the individual user. Managers have access to all public records. Users who need to Manage Teams, modify database schema, manage records owned by other users, create/edit layouts, import/export data, manage custom activity types, or update product information, should be Managers.
Standard - Represents the typical user. Standard users can access most areas of the application. This role can be expanded by adding or removing permissions for the individual user. Standard users can access public records and their private records. Users who perform a variety of tasks, including creating/modifying word-processing and report templates, but who do not need to modify or maintain the database, should be Standard users.
Restricted – Can access only basic functionality. Restricted users can only access public records and their private records. In addition, users with this role cannot delete any records, even records they own. Typically, Restricted users are assistants, hourly workers, or others requiring only limited access to features.
Browse – Gives users read-only access to information. For example, a Browse user can run reports. Temporary employees and users who only need to reference information should be Browse users.