GP security is based on granting users the access they need. They start with nothing. The basic model is explained in these three tiers:
1 – create the user
2 – grant the user access to the company(ies)
3 – for each company, you grant the user the access to a variety of resources within GP
Sounds like you got through 1 and 2. Now the fun part starts. You’ll need to learn what resources are needed. You can either read the documentation or figure it out by going through the security windows (tools > setup > system > user security) then drill-down through the hierarchy of role setup > task setup. It requires a fair amount of experience with GP.
Please note:
This action will also remove this member from your connections and send a report to the site admin.
Please allow a few minutes for this process to complete.
Report
You have already reported this .
Welcome to our new site!
Here you will find a wealth of information created for people that are on a mission to redefine business models with cloud techinologies, AI, automation, low code / no code applications, data, security & more to compete in the Acceleration Economy!