Category Archives: Security

Secure Documents and Communications in Sage CRM

Sage CRM allows us to customize data entry in a secured manner. Data security can be provided at various levels for an entity. In this blog post, we will explain how security can be applied in Communications and Documents. New Stuff: Creating Sage 100 ERP Primary contact from sage CRM Sage CRM standard functionality allows… Read More »

Sage CRM and IIS authentication settings

SageCRM is like any other web application which can be hosted on IIS for access over the network. Network access of applications is highly vulnerable to risks of injections. Hence IIS provides different Authentication methodologies that can be configured for any web application. However improper configuration of these parameters may lead to other issues and… Read More »

Restrict Sensitive Information

Implementation of SageCRM most of the times contains the two majors tasks, one is the actual implementation-configurations and other is Customizations. Whenever we implement SageCRM we must draw clear line as to what can be done by standard and what needs to be customized so that we never overshoot our implementation runway and crash land… Read More »

Few points to Enhance Performance of your SageCRM

As we know SageCRM is being used by large group of companies around the world. There is high possibility that on and off basis they may face slowness problem while logging into CRM. There are many ways to enhance the performance of SageCRM application but listing out few of them as we come across while… Read More »

Inherit parent entity security settings on child

In Sage CRM, I have created an entity as child of company entity through ASP pages. I wanted to assign the security rights to this entity similar to its parent i.e. Company entity. All the buttons, must be applied the predefined security settings for Company entity. Let’s take an example of New button which uses… Read More »

Theme of – SECURITY PROFILES AND TERRITORIES

Users do not “belong” to either profiles or territories. Profiles and Territories are set up to reflect the structure of your organization. Users are then assigned a profile and home territory depending on their position in the organization. Security Profile: A profile is a way of grouping users when defining access rights (View, Update, Insert… Read More »