Table of Contents

Table of Contents

This book describes the concept of role-based security and other security features as it has been implemented by coreBOS

This book is based on the official Open Source release. Your individual configuration might be slightly different if your CRM service provider has made changes to the system.

This Guide's Audience

This guide has been written mainly for coreBOS administrators. We expect that readers will have some familiarity with security management. This guide assumes a basic knowledge of security-related concepts and terms, including authentication, authorization, and roles. Although we provide a description of all features as they are implemented at the release date, this guide may not suffice as your only reference about coreBOS. This depends, on your needs and experience but also on the progress coreBOS makes.

This Guide's Organization

The first chapter of this book deals with security concept only, i.e. there are no prerequisites in terms of setting up coreBOS. It is helpful to have a basic knowledge of security-related concepts and terms. With regard to the real world example, however, having access to a CRM installation would obviously be an advantage as you could duplicate the setup and investigate your own tweaks to the security configuration.

This manual is divided into two parts:

Chapter 1: Introduction to Role-Based Security.
Describes how role-based security works. Explains in simple terms how to prepare yourself to start working with the CRM's security features. Provides all the information required to understand role-based security supported by the CRM System. Lists all the possibilities of different security settings.

Chapter 2: Examples
Explains, with examples, how to use the CRM system to assign privileges. Shows real-world examples for setting up complex user hierarchies

Why Read This Guide?

This Guide's Acknowledgements

This book has been in the works for a long time. It could not have been completed without the help and encouragement of a lot of people.

The vtiger team, its user community, and a number of people contributed technical feedback as this book was being written.

We thank the countless people who contributed to this manual with informal reviews, suggestions, and fixes. While this is undoubtedly not a complete list, this manual would be incomplete and incorrect without the help of Emilio Paolini, Walter Schönenbröcher, Dirk Gorny, Alexander Rothenberg.


Next | Chapter 1: Introduction to Role-Based Security.


© 2006 crm-now