Overview of Row-Level Security

MYOB Advanced implements a role-based, task-oriented approach to security. You assign roles to users and give the roles appropriate access rights to the system resources—such as modules, specific forms, form elements, and toolbar buttons—that the users need to perform their work tasks. For more information about user roles, see Configuring User Roles.

To give your organization the ability to apply more complex security policies, MYOB Advanced provides restriction groups, which you can administer in the Row-Level Security module. A restriction group is a set of entities of two or more types that you define to achieve one of these goals:

  • To restrict employees' visibility of sensitive data processed by using MYOB Advanced
  • To relate particular entities to each other so as they are used only together on MYOB Advanced forms.

In the sections of this topic, you can find brief information on restriction groups in general, types of restriction groups, and common usage scenarios for restriction groups.

Restriction Groups

You can use restriction groups to control the visibility of system entities to employees of your organization. For more information about restriction groups, see Restriction Groups in MYOB Advanced.

Your work with restriction groups in the Row-Level Security module includes the following tasks:

  • Creating a restriction group and including users and entities in it to control the visibility of entities in the system. For details, see Configuration of Restriction Groups.
  • Adding objects or users to an existing group when you add new objects and users in the system and need to configure visibility.
  • Removing objects or users from a group when you want to display the objects to all users or when the users' functional roles are changed in your organization.
  • Deactivating a group when you no longer need the visibility restrictions provided by this group.

For details on all operations with restriction groups, see Operations with Restriction Groups.

Types of Restriction Groups

MYOB Advanced provides two basic types of restriction groups—A and B. Restriction groups of both types can limit the visibility of system entities in a direct way (types A and B) and an inverse way (types A Inverse and B Inverse). The differences between A and B and between A Inverse and B Inverse are in how these groups work if the same entity is added to multiple groups. For details, see Types of Restriction Groups.

Combinations of Restriction-Group Entities

MYOB Advanced supports a variety of scenarios of configuring the visibility of entities within the system. With the most common scenarios, you can create restriction groups that include the following system entities:

  • Users and general ledger (GL) accounts: With these restriction groups, if your organization has sensitive GL accounts, you can make these accounts visible to a limited number of employees. For details, see Account and Subaccount Security.
  • Users and subaccounts: As with groups that include users and GL accounts, you can limit the visibility of sensitive subaccounts to employees. For more information, see Account and Subaccount Security.
    Note: For performance reasons, visibility restrictions by user for subaccounts do not affect analytical (ARM) and form-based reports or general inquiries. This means that users who can view the reports and general inquiries that include subaccounts will see the full list of subaccounts.
  • Users and vendor accounts: You can define these restriction groups to make particular vendors visible in the system to only employees who work with these vendors. For details, see Vendor Security.
  • Users and customer accounts: With these restriction groups, you can make particular customers visible to only employees who work with these customers. For details, see Customer Security.
  • Users and GL budget articles: With these restriction groups, you can limit the visibility of sensitive budget articles so that only particular users can see and work with these articles. For more information, see Security of GL Budget Articles.
  • Users and warehouses: You can create restriction groups to display a particular warehouse (or a set of warehouses) for only employees who work with this warehouse (or this set of warehouses). For details, see Warehouse Security.
  • Users and inventory items: You can define these restriction groups to reduce the number of items shown in lists with inventory items, depending on the particular employee signed in to the system. For more information, see Inventory Item Security.
  • Users and projects: You can define these restriction groups so that particular projects are visible to only a responsible project team. For more information, see Project Security.
  • Users and account groups: You can define these restriction groups so that particular project transactions that include sensitive data are visible to only particular users. For more information, see Project Security.
  • Users and printers: If the DeviceHub feature is enabled on the Enable/Disable Features form (CS100000), you can define these restriction groups to configure the visibility of printers to particular users. For more information, see To Configure Printer Access.
  • Branches, GL accounts, and users: With these restriction groups, you can allow users to work with only branch-specific accounts. For details, see Account and Subaccount Security.
  • Branches, subaccounts, and users: You can set up these restriction groups so that the system displays to users only the branch-specific subaccounts. For more information, see Account and Subaccount Security.
  • Branches and cash accounts: If there are multiple branches in your organization, with these restriction groups, you can allow users in each branch to work with only branch-specific cash accounts. For details, see Security of Cash Accounts.
  • GL Accounts and Subaccounts: If you have subaccounts that employees must use only with particular GL accounts, by defining these restriction groups, you can set up lists of available subaccounts for each GL account. For more information, see Account and Subaccount Security.