Setting Up Custom User Roles in Cetec ERP

Jan 23 2023

ERP administration often comes down to one practical question: who should be able to see what, and who should be allowed to do what? If the wrong users can view pricing, resale details, or other restricted records, you end up with confusion, process drift, and avoidable risk.

Cetec ERP handles this through custom user roles and role-based security permissions. By defining roles that match how your team actually operates, you can limit visibility and actions without turning day-to-day work into an admin bottleneck.

Create a New Role in Data Maintenance

To create a new user role in Cetec ERP, go to the Admin screen. Open the Maintenance tab, then choose Data Maintenance from the dropdown. In Data Maintenance, search for the Role table.

data_role.jpg

Define the Role Record

In the Role table, click Add Row. Enter a name for the role and a clear description so administrators know what it is meant to control.

If the role should inherit permissions from one or more existing roles, set the Parent ID field. Parent IDs reference existing role IDs, and multiple IDs can be separated by commas. Use parent roles when you want a new role to be mostly similar to an existing access pattern, with only a few additional permissions or blocks layered on.

add_record.jpg

Apply Security Permissions by Role

After the role exists, go to the Security By Role page from the Users dropdown on the Admin screen. This is where you connect a role name to specific security permissions or blocks.

Add the role name to the Value column of the security permission or block you want to apply. For example, if you add a custom role to a setting like Can see Resale - Block, then any user assigned that role will be prevented from seeing resale information in Cetec ERP.

config_setting_role.jpg

How to Decide When to Create a Custom Role

Create a custom role when a group of users needs a consistent access pattern that differs from the roles you already use. If you find yourself repeatedly making one-off exceptions for the same kind of user, that is usually a sign the access model should be formalized as a role.

Key Takeaways

  • Use custom roles in Cetec ERP to control visibility and prevent unwanted actions.
  • Create roles in Admin > Maintenance > Data Maintenance, using the Role table.
  • Use Parent IDs to inherit access patterns from existing roles when appropriate.
  • Apply permissions and blocks through Security By Role so role assignments drive consistent behavior.

Conclusion

Custom roles are a practical way to keep Cetec ERP aligned with how your team works, while protecting sensitive data. When roles and security settings are set up intentionally, users get the access they need and administrators keep control over what stays restricted.