11.2 | Security and Granting Permissions


Total Office Manager offers an extensive security feature. When enabled, users have password level access to the software. Additionally, administrators can set security on nearly every single form and list used in the program. This very robust security allows you to restrict what various users can do. You may grant permissions only if you have enabled security in Preferences.

To enable security from the main menu, click Edit | Preferences | Security. Here, in the Security Options area, tick the “Enable Security” checkbox.

Granting Permission to Users

Not every employee needs or even should be able to access all of your company data. Total Office Manager allows you to create users that can manipulate your company data. You can control whether or not each user can view, edit, add, delete and void data throughout Total Office Manager.

Total Office Manager users are also employees though not all employees are Total Office Manager users. A Total Office Manager user is allowed to log into Total Office Manager and use the application. Depending upon the security settings for the individual they may or may not be able to use certain menu commands.

How to Select Specific Permissions

Total Office Manager will display a complete list of virtually every form in the program. Simply locate the form or report and check the appropriate boxes to grant or restrict access.

You have the ability to grant the following types of permissions:

  1. View: The ability to open and look at a form (usually a list of some type).
  2. Edit: The ability to make changes to a certain form.
  3. Add: Allows a user to add records such as invoices, checks, etc.
  4. Void\Inactivate: The ability to mark a record, such as a check, as Void or a Customer:Job asinactive
  5. Delete: The ability to delete a record completely. Be very careful with who gets this permission. Generally, you should only grant void\inactivate permissions; even to your most trusted bookkeepers.

Reports: Total Office Manager offers a report that will show you who has permission to do what. Click Reports | User Security.

Selection Tools

Copy From User

Once you have setup one user, you can select them from this list. All the permissions will be copied over. You may then change them to suit your needs. When you save, the person you copied from will NOT be changed.

Jump To Selection

Select a section to jump to. You can’t filter the list, but you can jump to a section.

Select\Deselect Button

This tools allows you to quickly check or uncheck an entire column. Sometimes it is easier to check the entire list and start unchecking items from the list.


  1. Each form has its own security, so you don’t have to worry about people gaining access to one form which in turn allows them to gain access to another. Example: You can grant access to Estimates. PO may be converted into Invoices or Purchase Orders. The user will need “Add” permission to convert the estimate to any other type of form.
  2. If you have access to a form, you generally have access to all of the tabs on that form.
  3. Almost every list form has an export option. If a user can view the list, they can export thecontents of that list.
  4. You should severely restrict access to anything related to credit card processing, direct deposit,and payroll.
  5. Be very careful about granting permission to delete anything. Someone with higher authoritycan go through Total Office Manager and delete things later after these records are carefully reviewed.