Security – Toshiba Electric Keyboard User Manual

Page 34

Advertising
background image

Symphony Pro User Manual 2.0.2.15

32

© 2005 TOSHIBA TEC AMERICA AMERICA RETAIL SYSTEMS, INC. R1.0a

3.1.8.8

Security

Security Tab Settings

Security System Overview

The Symphony Pro Software offers a security level system to restrict access to most functions,
database tables and configuration type information. In some situations, such as a single owner-
manager Symphony POS / Symphony Pro setup, or if the PC that runs the back office is in a locked
room, you may not need to use the security system. In most cases however, the PC station that runs
Symphony Pro (or networked Symphony Pro stations) is accessible to any passer-by. This means that
your data and system configuration is open to possible damage.

The security system is based on access levels that are assigned to users. There are eight (8) levels,
starting with level 0, called "no user", up to level seven (7), called "programmer". Assigning the "no
user" level to an option or utility means that anybody can access it. Once a security level is assigned to
a function, option or data table, the system verifies the logged in user to make sure that they have
access rights. If the user does not have access rights, the system opens a login panel.

Below is an example of how the security levels might be set.

Level 0: No User - locked, the default security level when Symphony Pro is launched
Level 1: New User - able to access certain tables only, for example items, departments etc.
Level 2: Cashier - access to items, departments and other functions that a cashier would require
Level 3: Clerk - receive, modify, view certain reports
Level 4: Assistant Manager - access and modify items, departments. Access to reports
Level 5: Manager - Access, Modify, Add / Delete, no access to network and programming features
Level 6: Owner - Access, Modify, Add / Delete all except programming features
Level 7: Programmer - complete access

Essentially, there are two steps to follow to implement the security system:

· First: Establish the minimum security level required to access each of the system functions,
options, data tables, and configuration files listed in the Security Tab of the Configuration Panel.
· Second: Associate each operator in the operator table with a security level.

Remember that this is the MINIMUM level required. A user with a higher access level has access to all
levels below.

Establishing access levels

The System tab displays a list of data tables, utilities and setup information. The list has four (4)
columns:

Column 1 - the name or description of the option to protect.
Column 2 - "Access" - the minimum security level required to access the option.
Column 3 - "Modify" - the minimum security level required to change data or settings.
Column 4 - "Add / Delete" - the minimum security level required to add or remove data.

Advertising