Access to the software requires authentication via login and password, granting specific authorizations adapted to the user’s function and position. Once authenticated, the user can easily perform various tasks such as generating quotes, invoices, purchase orders, managing customer invoicing, cash operations, as well as general accounting activities. Customizing permissions ensures a targeted and secure user experience.