Sage 100 security requires more than reviewing users inside the software. Depending on how Sage 100 is deployed, security may also involve your Windows server, workstations, remote access tools, hosting provider, backups, SQL Server, third-party integrations, and internal IT policies.
This page is designed to help Sage 100 customers understand the key areas they should review to help protect their system, data, and users.
The goal is not to turn your accounting team into network engineers. That would be rude. The goal is to help identify the right security questions and make sure the right people are reviewing them.
The first step is understanding how your company accesses Sage 100.
If Sage 100 is installed on your own server, your internal IT team or managed service provider should help review:
ACC can help review Sage 100 application security, but the server and network environment should also be reviewed by your IT provider.
If Sage 100 is hosted by a third-party provider, many server-level protections may be handled by the hosting company. However, your company should still validate what is being managed and what remains your responsibility.
Questions to ask your hosting provider include:
Hosted does not mean “nothing to review.” It means the review includes the hosting provider, because apparently responsibility likes to hide in contracts.
Sage 100 allows companies to create roles and assign those roles to users. Roles can control access to companies, modules, menus, tasks, and security permissions.
A good security review should include:
Roles should match actual job responsibilities. For example, Accounts Payable, Sales Order Entry, Warehouse, Purchasing, Controller, and Read-Only Reporting users should not all have the same access.
Administrator access should be limited to a small number of trusted users.
Companies should review:
Administrator access should not be assigned casually. “They are good with computers” is not a security policy. It is how chaos gets a login.
Many Sage 100 customers access the system through Remote Desktop Services, Citrix, or a hosted desktop. Remote access should be reviewed carefully because it is often the front door into the system.
Recommended areas to review include:
Sage’s documentation includes specific considerations for Remote Desktop Services and Citrix environments, including workstation setup and server configuration considerations.
Backups are part of security. If data is damaged, deleted, encrypted, or lost, your recovery plan becomes just as important as access control.
Companies should confirm:
A backup that has never been tested is just a very confident guess.
Sage 100 environments often include third-party tools for EDI, shipping, credit card processing, reporting, warehouse management, custom scripts, and other integrations.
Each integration should be reviewed to confirm:
Unused integrations and old access points should be removed or disabled.
Running unsupported software can increase security and operational risk.
Companies should review:
Sage’s 2026 installation guide notes that Sage 100 2026 is 64-bit only and includes specific upgrade planning considerations for customers with older 32-bit versions installed.
Use this as a starting point:
ACC Software Solutions can help Sage 100 customers review application-level security and identify areas that should be discussed with internal IT or a hosting provider.
ACC can assist with:
Need Help Reviewing Your Sage 100 Security Settings?
ACC Software Solutions can help your team review Sage 100 user access, roles, administrator permissions, hosted environment questions, remote access concerns, and other security best practices.
Contact ACC Support
Email: support@4acc.com
Website: www.4acc.com/support
Solutions by Industry
What's New
The Hidden Cost of “We’ve Always Done It This Way”
Read MoreSubmitted by Stephanie Dean on Tue, 04/28/26 - 9:26
Sage 100 Updates: Why Staying Current Is Critical
Read MoreSubmitted by Stephanie Dean on Fri, 04/17/26 - 14:19
Eliminating Manual Processes with Modern ERP Tools
Read MoreSubmitted by Stephanie Dean on Mon, 04/13/26 - 11:49