Security and access levels are controlled.
The System administrator sets up security on a user and group level using a matrix of:
The system is highly configurable through the interface or can be easily customised in the code base. Below are examples of how the system is adapted for specific uses.
Example of a customised Invoice Capture screen
Example of a customised screen for tracking shipments and deliveries in a logistics department
Web part to enable document access from SharePoint.