Category Archives: Security

Cloning Interactive Dashboard

Sage CRM Interactive Dashboard is on of the great feature. Where in you can see all data on same page. But creating Dashboard is very time consuming process. To overcome this we can Clone Interactive Dashboard feature of Sage CRM. In this blog we are going to explain you how to create the Interactive Dashboard… Read More »

Merging Person records from Different Companies

This blog is in continuation of my previous blog wherein I have explained the process of Merge Person functionality of Sage CRM. You can refer below link for the same. Related Post: Remove Duplicate records, move data of one Person to another in Sage CRM Though the Merging option has helped to manage data accuracy and… Read More »

Allow Territories in Security Profiles

In Sage CRM, we can manage security access rights across the organization by using Security Profiles and Territories. Security Profile is a way of grouping users to define particular rights to them. New Stuff: Interactive Dashboard – Permission Denied Issue So in future if we need to make changes in rights then we can do… Read More »

Troubleshooting Sage CRM’s Customized Data Upload Routine Issue

As we all are familiar, Sage CRM has provided the facility to create multiple Primary and Secondary entities to maintain data in system either by making data entries manually or by  uploading large number of records at a time. Sage CRM’s flexibility has helped the users to not only use the data upload routine for standard… Read More »

DCOM configurations on 64 bit server and 32 bit Microsoft office – Part 2

We have been writing blogs explaining the tips to troubleshoot issues while working with Microsoft Interop Assemblies. This blog is in continuation of previously written blog which you can refer below. Related Post:  Dcom configurations on 64 bit server and 32 bit Microsoft office I had discussed couple of settings which should be configured in DCOM… Read More »

Secure Documents and Communications in Sage CRM

Sage CRM allows us to customize data entry in a secured manner. Data security can be provided at various levels for an entity. In this blog post, we will explain how security can be applied in Communications and Documents. New Stuff: Creating Sage 100 ERP Primary contact from sage CRM Sage CRM standard functionality allows… Read More »

Sage CRM and IIS authentication settings

SageCRM is like any other web application which can be hosted on IIS for access over the network. Network access of applications is highly vulnerable to risks of injections. Hence IIS provides different Authentication methodologies that can be configured for any web application. However improper configuration of these parameters may lead to other issues and… Read More »

Restrict Sensitive Information

Implementation of SageCRM most of the times contains the two majors tasks, one is the actual implementation-configurations and other is Customizations. Whenever we implement SageCRM we must draw clear line as to what can be done by standard and what needs to be customized so that we never overshoot our implementation runway and crash land… Read More »