Search Results

Search Results

Articles tagged "access" returned 150 results.

Page 13 of 15

The Basics Part One

Who is it aimed at? All Gold-Vision users. What does it cover? How to login, your home page view, accessing menus, viewing and adding notes, along with navigation and searching...

Data Bridge

...control to update or stop the jobs when required. There is clear visibility of job statuses and access to logs to review any import issues. Info Please note Data Bridge...

Updates

...in Flow View Social Authentication list displays all authentications for users with access to Settings Privacy Dashboard – Purpose Removal Date displays the correct date Links / Relationship options show...

Portal Management

...Close modal Add a Space Title and Description Select the integration (if you have more than one) Access – who do you want to view the space (see below re...

Settings, View & Publish

...can amend the Space name. Description – you can amend the Space Description Access – make the space visible to the contacts associated with the roles. Click on the Save...

Portal View – Examples

...in the Portal Contacts can add activities, these can either be Account, Contact, Opportunity or Project activities depending on how you have configured your portal and user access. These will...

Install the Portal

Install In order for you to access the Portal Install your Gold-Vision license will need to be updated and a valid subscription will need to be in place. Please contact...

Data bridge import

...control to update or stop the jobs when required. There is clear visibility of job statuses and access to logs to review any import issues. Info Please note Data Bridge...

Add Web External Items to Dashboards

...your external item. To access this typically you can find it by: Selecting Share > embed > select the URL from this code only. See our example below. Once you’ve...

Modern Authentication Overview

...Authentication to give users access to workstations, network resources and other services within the environment. This legacy authentication approach is not seen as secure enough as online services become widely...