Enjoying what you’re reading? Sign up now.


How To Set Up Dynamic Reporting Security Access

Security Access Dynamic Reporting screenshot
Article Highlights:

  • Keep data and report access in the hands of those who need it.
  • These three layers of security help manage Dynamic Reporting permissions.

Dynamic Reporting is a powerful tool for creating custom reports in ERA-IGNITE using existing system data. To keep data and report access in the hands of only those who need it, there are three layers of security for Dynamic Reporting in the Security Maintenance application. These can be set on the individual User ID or User Group level for greater efficiency and consistency with security permissions.

Pull Up a Security Record

To look up a profile record, access the Search/Change Security Profile Record screen in the Security Maintenance application. Select the appropriate tab, User ID or User Group, depending on the type of record you need to access. Enter any search criteria, such as the User ID or Name, in the Criteria section and select Search (F5). Double-click or select and press ENTER to open the security record.

1. Store and Application Access

The first layer of security is store and application access. Each User ID can have customized access to the data of the stores and branches that apply to the individual. To give a User ID access, go to the Basic Profile Information subscreen within the User ID security record. Once there, select the lookup icon from the Application Access field.

In the Application Access window, expand the permissions for the store with the plus icon next to the store name. Then, select the Access checkbox for any relevant applications within the appropriate branches, and select OK (F12).

Note, User Groups are not given store and application access via the Application Access window. User Groups can be given access to the necessary stores and branches from the Security Access subscreen or the Enterprise Security Management subscreen.

2. Security Access

For the second layer, the User ID or User Group needs access to Retail Management Intelligence. This can be granted in the Security Access subscreen. If the User ID or User Group does not have Retail Management Intelligence listed on the Security Access subscreen, select (F5) Add/Remove Application.  Next, select the Access checkbox for Retail Management Intelligence, then Update (F12).

On the Security Access screen, under Retail Management IntelligenceDynamic Reporting, specific security permissions can be set for Dynamic Reporting. Select the checkboxes in the permission column for each necessary security item. Each User ID should only be given as much access as necessary to accomplish the tasks for their job role; not every user needs access to every security permission.

Permissions for Dynamic Reporting should be granted in each relevant store and branch. For those with multiple stores or branches, these permissions can also be managed from the Enterprise Security Management subscreen instead.

3. Data Set Security

The final layer of security is Data Set security. The Data Set you use dictates which fields are available to be used in a dynamic report. On the Dynamic Reporting Data Set Security subscreen, Data Sets are organized by Run Area. A user can be given access to some or all Data Sets within each Run Area for the selected store and branch.

There is also a checkbox to grant access to all Data Sets within a store/branch for those who need complete access to all Data Sets, but it is recommended that users are only given access to the specific data sets they need for their role.

Permissions for Dynamic Reporting Data Sets should be granted in each relevant store and branch. As with Security Access, these permissions can also be managed from the Enterprise Security Management subscreen for those with multiple stores and branches.

When appropriate security permissions are granted to users, Dynamic Reporting is a useful, flexible tool for users to craft unique reports within ERA-IGNITE.

For more ERA-IGNITE training opportunities, check out Reynolds Software Education for upcoming webinars and classes.

Share this Article

Software Education, Reynolds and Reynolds

Jennifer McReynolds has worked in Software Education over 15 years. In addition to overseeing the training of her instructors, Jennifer reviews and updates course materials to match recent software changes.

Related Articles:

Employee clocking in on their phone

Mobile Time Clock: Getting Started with Geofencing

Simplify the time punch process and establish boundaries using geofences with Mobile Time Clock.

Woman working at her computer

Configuring Posting Screens in ERA-IGNITE Accounting

If most of your day is spent posting to the journal, try starting in posting mode instead of starting in search mode.

desking keyboard hotkeys

Tips and Tricks for Desking

Navigate the Desking application easier with these tricks.

Employee working at their desk

Customization Options to Improve Your Workflow

When you customize your software, you can help streamline your operations.