Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...


Locate and click on the 
Administration and Maintenance tab. Next, click on the Users.

 Image Removed

...

Anchor
Normal User
Normal User
Normal Users

Normal Users are defined by Database Roles (System Administrator, Normal User, Cafeteria User, User-Defined Role) and may have limited access to functions in the program dependent upon allowed permissions.

From the Administration and Maintenance tab, select Users. Then, choose Normal Users.


Change Password

Step 1: Highlight the user from the list and select Change Password.

...

Info

Passwords must contain at least one (1) letter and one (1) digit or punctuation and must be at least six (6) characters. e.g. Newton1

 

Attach Users

Info

The list of users comes from the MCS Admin Console. A new user must first be added into Admin Console before it is available to attach in Newton.

...

    • Database Role - Use the drop-down menu to select a database role from the list.
    • Full Name - Enter the user's full name.
    • Email Address - Enter the user's email address.
    • Inactive - If a user no longer requires access to the system, place a check mark in the Inactive box.

 

Add Role

Step 1:  Highlight the user from the list and select Add Role.

...

Anchor
ServingLineUser
ServingLineUser
Serving-Line-Only Users

Serving-Line-Only Users have access to Newton POS only and may have limited access to functions in the program dependent upon allowed permissions.

...

    •  Report Menu - Use the drop-down menu to select the appropriate reports menus available for the role.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

...

Anchor
Permissions
Permissions
Permissions

...


Locate and click on the Administration and Maintenance tab. Next, click on Permissions.

Image Removed

...

Anchor
Cafeteria Permissions
Cafeteria Permissions
Cafeteria Permissions

Step 1: From the Administration and Maintenance tab, select Permissions. Then, choose Cafeteria Permissions.Image Removed

Step 2: Establish security levels for each permission and role.

...