Full understanding, comprehension and documentation information is available in the application by clicking “Help For This Page” while viewing any of the following security modules.
Sharing Settings, Profiles & Roles

Profiles & Roles

If you have a requirement to set up record security and access to objects for different groups of users, under Sharing Settings, you can change the default “Full Access” permissions Role and add Sharing Rules based on your requirements. To implement a security model you will also need to configure settings for Profiles and Roles.
In general, within a role hierarchy someone in a higher role can see records owned by users in a role below them. Those in roles below, need access to records owned by someone above them, can be accomplished with the Sharing Settings mentioned earlier.
At the very least, ensure that you have a profile called Full Access under the root of the hierarchy to add all your users to. More complex role assignments can be added later.
Role Hierarchy

Advologix comes configured with a “full access” security model when it is installed and signed up for from our website, www.advologix.com. This means all users have access to see all data and to access a features of the program.
NOTE: Unless purchased separately, only 1 Administrator account is provided per Advologix system.
The person assigned to this Administrator account will be able to access all data and features, regardless of their profile and role.
To set up a full security model, obtain the following information first:
- Design a hierarchy of Roles (groups).
- Group your users into Profiles, in terms of what access to what components (tabs) of the system they will need access to.
- Create your Role hierarchy on the Roles page.
- Create and design your Profiles on the Profile page.
- Adjust and Default Sharing Settings and create Sharing Rules on the Sharing Settings page.
Field Accessibility

If you need to restrict certain fields on a page layout(form) from view for certain profiles, you can do so here at a very granular level.
Password Policies

Use these options to design password security controls.

Profiles control access to what you can “do”. For example, a user’s profile will determine whether or not they can access Invoices, Retainers, or any other object/tab at all, and if so, what are their permissions to view or edit these records. At the very least, please copy the Profile named Standard Platform User.

Click on its name in the Profile list, click the Clone button, name in AdvologixPM and save. Then, edit this new profile and ensure that permissions match what is show here above and below.

Then, ensure that the Modify All permission is set for sll Standard and Custom Object section items as is shown here.
