User access is one of the most important parts of ERP security. Strong access controls help ensure employees can perform their responsibilities while reducing exposure to sensitive financial, customer, vendor, and operational data.
ACC helps customers review user access, security roles, MFA options, and single sign-on considerations for Acumatica, Sage 100, and related systems.
When access controls are overlooked, businesses can unintentionally create security gaps through excessive permissions, inactive accounts, weak passwords, or shared logins. A structured access management strategy helps reduce risk while improving accountability and visibility across the organization.
Multi-factor authentication (MFA) adds an extra layer of protection when users log into a system. Instead of relying only on a password, MFA requires an additional verification step, such as:
Even if a password becomes compromised, MFA helps prevent unauthorized access by requiring a second form of verification.
Passwords alone are no longer enough to protect business systems. Cybercriminals commonly target login credentials through phishing emails, password reuse, and automated attacks.
MFA significantly reduces the likelihood of unauthorized access by adding another checkpoint before a user can enter the system.
For ERP environments, MFA is especially important because these systems often contain:
ACC works with customers to review MFA availability and implementation options within their ERP and related applications.
Single sign-on (SSO) allows users to log into multiple connected systems using one secure identity provider and one set of credentials.
Instead of maintaining separate usernames and passwords across different applications, users authenticate once through a centralized login process.
Benefits of SSO can include:
SSO can also make it easier to disable access quickly when an employee leaves the organization.
Administrator accounts typically have elevated access to ERP systems and should receive additional protection.
Recommended administrator security practices include:
Administrative accounts should only be assigned to users who truly require elevated permissions for their role.
Over time, employees may change responsibilities, departments, or job functions. Without regular reviews, users can accumulate unnecessary permissions that increase security risk.
Periodic role reviews help ensure users only have access to the data and functions required for their current responsibilities.
Areas commonly reviewed include:
ACC assists customers with reviewing security roles and helping align access with operational responsibilities.
One of the most common security oversights is failing to remove access for former employees promptly.
Inactive user accounts can create unnecessary exposure, especially if accounts still have remote access capabilities or elevated permissions.
Organizations should establish a consistent offboarding process that includes:
Prompt account removal helps reduce unnecessary security exposure and improves overall access governance.
Shared user accounts make it difficult to track activity and reduce accountability within the system.
When multiple individuals use the same credentials:
Each user should have their own unique login credentials whenever possible. Individual accounts improve visibility, accountability, and overall security management.
User access and security settings should not be reviewed only once. Regular reviews help organizations identify outdated permissions, inactive accounts, and policy gaps before they become larger issues.
A common review schedule may include:
| Review Area | Recommended Frequency |
| User access reviews | Quarterly |
| Administrator access reviews | Quarterly |
| Former employee account checks | Ongoing |
| MFA verification | Annually or after major changes |
| Security role reviews | Annually |
| Password and authentication policy reviews | Annually |
Organizations with compliance requirements or higher security risks may require more frequent reviews.
ERP security is not only about technology. It also depends on consistent user management, strong authentication practices, and controlled access to sensitive business data.
ACC helps organizations evaluate user access structures, review security roles, discuss MFA and SSO options, and improve access management practices within Acumatica, Sage 100, and related business systems.
If you would like assistance reviewing ERP access controls or security practices, contact ACC Software Solutions to start the conversation.
Solutions by Industry
What's New
The Hidden Cost of “We’ve Always Done It This Way”
Read MoreSubmitted by Stephanie Dean on Tue, 04/28/26 - 9:26
Sage 100 Updates: Why Staying Current Is Critical
Read MoreSubmitted by Stephanie Dean on Fri, 04/17/26 - 14:19
Eliminating Manual Processes with Modern ERP Tools
Read MoreSubmitted by Stephanie Dean on Mon, 04/13/26 - 11:49