Administration (ADM):

MIP Fund Accounting® Training

In Administration (ADM) training for MIP Fund Accounting you will learn how to add or modify users in the system. You will also learn how to modify or add security for a user and the different security options available in the system.


ADM 01: Adding or Modifying a System User

  • The correct module to be in when adding or modifying a user
  • Standards for setting up users
  • How to add a new user and the proper settings
  • How to establish and change passwords
  • How to rename a user
  • How to set minimum password lengths


ADM 20: Adding or Modifying a User’s Security

  • What the security options (V-E-D-A-P) mean and what each letter allows the user to do
  • The difference between system security and organization security
  • How to administer rights to a user
  • How to set up organizational security

Training Agenda

    1. ADM 01: Adding or Modifying a System User - Training Video

    2. ADM 01: Adding or Modifying a System User - QUIZ

About this course

  • Free
  • 2 lessons
  • 0 hours of video content

Looking for cost-effective training options for MIP Fund Accounting®?

Custom sessions. Interactive training. Your database. Unlimited participants.

Course Details:

This Administration (ADM) module in our MIP Fund Accounting training focuses on the parts of the system that control who can do what, which is where most preventable operational risk lives. When user setup and security are handled casually, you end up with either locked-down workflows that slow everyone down or over-permissioned access that makes mistakes harder to trace.

You will learn how to add and modify users in MIP Fund Accounting, including the standards that keep user records consistent across your organization. The training covers the practical steps for creating new users with the right baseline settings, updating existing users as roles change, and managing account details such as passwords. It also includes settings like minimum password length, which matters because MIP security is only as strong as the policies you enforce inside the application.

The module also explains the system’s security options, including the difference between system-level security and organization-level security and when each applies. That distinction is important because it affects whether a user’s access is controlled globally or varies by organization, which is a common source of confusion when someone can access one area but not another.

Finally, the training covers administering user rights using the V-E-D-A-P security options. You will learn what each letter represents and what it enables a user to do, so you can assign permissions based on job responsibilities rather than guesswork. This makes it easier to support segregation of duties, reduce accidental changes, and keep access aligned as staff rotate or responsibilities shift.