Controlling access to information is vital. Whether you are restricting just read access, or restricting the privileges to edit information, it is important that you have flexibility to design the rights granted to different members in your organization. Some of the highlights that Entole offers include:

 

  1. Users have roles through which they gain access to functions and data. Taking a deny-by-default approach, role-based security controls WHO can do WHAT on WHICH data. The “who” is the role. The “what” refers to the functions that a role can perform. And the “which” is the set of data that a user can access when performing a function. There is a hierarchy in our role-based security model, which provides simplicity in managing and delegating authority, as well as the ability to be extremely granular in the level of privileges assigned. We deliver many roles out of the box, which can be used, but can also be modified to meet your specific requirements. Roles can be auto-provisioned to and revoked from users per your internal structure.
  2. Restrict Access to General Ledger Segments
    1. Allow users with limited privilege to only access certain parts of your books
    2. For example, if you have an operating company that has its own team of members, you can restrict access to ledger information for its team that relates only to that company.
  3. Restrict Access by a Unit of your Business
    1. In a Family Office you often have dozens, or more, Legal Entities that must be managed. You can group a number of these Legal Entities into a single Business Unit, or you can divide a single Legal Entity into multiple Business Units.
    2. What does this do for you? It allows you to easily group teams of people to operate on a group of entities, a single entity, or a division of a Legal Entity.
  •  
    Entole
  •  
    Entole