MiMS Security
MiMS has security functionality with 2 kinds of security that can be enabled, Object Security and Program Security.
MiMS security has 2 kinds of security that can be enabled, Object Security and Program Security.
Prior to activating either version of MiMS security all users are given administrative access to all areas of MiMS.
MiMS Security is an optional component that you do not have to use if you do not wish to. There are some specific modules that MiMS provides that may require you to use MiMS Security. One example of a module that will require MiMS Security is the Time Tracker module which is a built in for handling employee times and scheduling.
Object Security vs. Program Security
Object Security
Object Security in MiMS means to secure a specific area of the program.
This security method allows all users to still enter MiMS with administrative access. When trying to enter any area of the program that has been secured, a prompt will display asking for a user name and password. Without entering the correct user name and password you will not be allowed to enter the given area of the program.
For example if the Reports area of MiMS is secured when you try to access the Reports area you will get a prompt asking to enter in the user name and password before you can proceed.

Program Security
Program Security in MiMS means to completely secure the MiMS program.
This security method secures the entire program. This will require a user to log into the MiMS program before they are allowed to access it. The areas that a user has access to and what the user can do will be limited during the setting up of the security.
Enabling MiMS Security
MiMS security is located under “Security” section of the “File” menu. To start using MiMS Security click on the “Start MiMS Elite Security” button. The “MiMS Security” window will appear.
Admin Tab
You initially start on the Admin tab. This tab is for setting up the MiMS system administrator.
**You MUST have an administrator in order to use MiMS security.

Enter in a login name, password, and if desired, a description and click the “Next” button.
Objects tab
The Objects tab is for use if you are setting MiMS up in Object Secured mode. This tab is designed to allow you to say which areas of MiMS you wish to specifically restrict access to.

To work with this tab click on the “Advanced” button.
In the Advanced view you will get a list of all areas of MiMS that you can secure.
Go through the list and make sure to check all areas of MiMS that you wish to secure.
When finished working on the “Objects” tab or to skip for setting up Program Secured mode, click the “Next” button.
Roles Tab
The Roles tab is the 1st of 3 tabs used for setting MiMS up to run in Program Secured mode. This tab is designed to set up the user access to each area of MiMS based on the users permission level.
To work on this tab click the “Advanced” button.
In the Advanced view you will get a split window. On the left side is a list of all areas of MiMS to secure and the right side lists the permission levels for those areas.

Go through the list of each area and set up the user access permissions for each type of user level there is.
When finished working on the “Roles” tab or to skip because you are going to run in Object Secured mode, click the “Next” button.
Users Tab
The Users tab is the 2nd of the 3 tabs used for setting MiMS to run in Program Secured mode. This tab is designed to setup all of the user logins for MiMS and each user’s permission level.

To add a new user click on the “Add User” button.
In the new MiMS User window enter in the user “Login name”, and login password, a description if desired, and choose the user’s permission level also called the type of user.

Click “OK” when finished creating the user. If any other users are to be created click on the “Add User” button again and repeat the add user process as needed.
Edit User: In the event that any piece of a user’s information needs to be changed click on the user in the list and then click on “Edit User” to change whatever needs correcting.
Activate: By default all users that are created are automatically active which means the user name and password is usable to log in with. In the event that any user had to be temporarily deactivated click on the user in the list, click on “Activate” and the user will be active again.
Deactivate: In some event that a given user needs to be made unusable temporarily click on the user name and then click on “Deactivate”. This will make it so that the chosen user login will not function without having to remove it from the system.
Edit Permissions: This is a short cut to the Permissions tab. By clicking on a user and then clicking on this button the Permissions tab will be loaded with the specific permissions for the chosen user displayed.
When finished working on the “Users” tab or to skip because you are going to run in Object Secured mode, click the “Next” button.
Permissions Tab
The Permissions tab is the 3rd of the 3 tabs used for setting MiMS to run in Program Secured mode. This tab is designed to give specific permissions to users that may contrast settings used on the Roles tab.
So for example if a specific user is setup as a Standard user but this 1 user is supposed to have Administrative access to 1 area that all other users are only to have only Edit access, this tab is where you can make this possible.
Of the 3 tabs used in the setting up of Program Secured mode this tab is optional.

To use this tab you must first select a user in the drop-down at the top of the tab.
Once a user is selected a list of all areas of the program will appear with the current permission settings for that area for the user.
Go through the list of the areas of MiMS and change the permission level for the given user to each area as desired.
The options on the left side for None All, Read All, Edit All, Full All is to help auto check all areas of access to the given permission type.
When you are finished working on 1 user, if there are any other user permissions you wish to change on this tab just select the next user from the drop-down list.
When finished working on the “Permissions” tab or to skip because you are going to run in Object Secured mode, click the “Next” button.
Security Tab
The Security tab is the final tab of the MiMS security. This tab is where you choose what type of security mode you wish to run in.
The top option of “Would you like to make Objects Secured” is where you set MiMS to run in Object Secured mode.
The bottom option of “Would you like to make MiMS Elite Secured” is where you set MiMS to run in Program Secured mode.

Choose the “Yes” option next to the security mode you wish to run in, click the “Finish” button and you are all finished activating the MiMS Security.