This is an old revision of the document!
In Security Administration, set up the necessary purchasing roles (originators, approvers, etc.). Once the purchasing roles are set up, you can assign the roles to the appropriate purchasing users.
++++Image|
The Texas Computer Cooperative (TCC) is committed to making its websites accessible to all users. It is TCC policy to ensure that new and updated content complies with Web Content Accessibility Guidelines (WCAG) 2.0 Level AA. We welcome comments and suggestions to improve the accessibility of our websites. If the format of any material on our website interferes with your ability to access the information, use this form to leave a comment about the accessibility of our website.