Security Roles

The following table depicts the security roles and their corresponding access levels.

In general, the following guidelines apply:

Note that the "restrict logins by IP" settings may be used to limit access from specific locations. This feature may be enabled either on a per-user basis or on an organization wide level. 

Role Based Security Settings