When Should I Delete a User versus Making the User Inactive? Article
If a user has a complicated set of department security rights it can be helpful to inactivate the user when they no longer need system access. When a new person who needs the same security as the inactive person is identified the Duplicate User function can be used to copy all the security rights of the inactive user. This can be an very efficient way to manage security.
Deleting a user does not delete Audit History.
If the user's security setup is not complicated then the user can be deleted.
Related Articles
Assign User Permissions Article
PDF Tutorials Interactive Tutorial Cropped Screenshots Full Page Screenshots Step By Step Tutorial - Assign User Permissions CLICK ON THE BLUE LINK ABOVE TO VIEW TUTORIAL See attached PDF's, and Other Tutorials & Knowledge Base Page Links ...
User Profile Article
The user profile window has three (3) tabs: 1. User Info 2. System Info 3. Error Reporting User Info Tab To change password, enter existing password, a new password, and enter the password a second time to confirm. Enter the User's First & Last Name ...
Assign User Permissions Tutorial
PDF Tutorials Interactive Tutorial Cropped Screenshots Full Page Screenshots Prerequisite Steps: Import Active Directory Users, Map Users to Companies Purpose: This screen is used to assign user security as well as restrict system user ...
Assign User Permissions-Manually Add a User (Duplicate User ID) Tutorial
PDF Tutorials Interactive Tutorial Cropped Screenshots Full Page Screenshots Other Related Tutorials & Page Links: * Step By Step Tutorial-Assign User Permissions * Knowledge Base Page Link-Assign User Permissions * Step by Step ...
Assign User Permissions - Impersonate Video
Purpose: This procedure allows you to impersonate a user to view user permissions or see what they can see.