Security and Configuration
RMB’s security and configuration system provides robust protection and customizable features, such as access controls, password requirements, and detailed event logs, all designed to support superior software management.
Robust Security Features
User Profiles
Assign unique user profiles for every user to ensure personalized security.
Password Specifications
Enforce password complexity requirements to strengthen security.
Access Groups
Set up distinct access groups for each user profile, granting tailored viewing and functional permissions.
Field Access Control
Manage functional permissions and field visibility by access groups, allowing users to declutter interfaces by hiding unused fields.
Advanced Configuration Options
User Setting Customization
Empower users to personalize their experience, including adjusting the number of records per page, choosing between list or form views, setting floating toolbars, and selecting light or dark mode.
System Text Customization
Rename fields to reflect your business terminology for a more intuitive interface.
System Values and Defaults
Switch system features on or off to align with your business needs.
Multi-tenant Cloud
Benefit from automated weekly upgrades for seamless updates.
Comprehensive Logs
Event and Audit Logs
Gain complete visibility into transactions with detailed event and audit logs.
By implementing RMB’s security and configuration system, your business can ensure robust protection while benefiting from advanced customization options, resulting in strengthened security and more personalized management tailored to your business’s needs.
"We have interfaces with financials, purchasing, and other critical parts of the ERP... RMB Solutions worked hard to ensure a good user experience for the 65 people interacting with the system. They customized the system so labels matched the ones we were used to working with here."
– Jorge Alvarez
Director of IT, Hussmann – Latin America