This article explains how to securely grant an external auditor read-only access to your Microix system, including access to all transactions, attachments, and audit trails.
Microix does not allow non-organizational email domains for login accounts; therefore, you must create a user using a fake email address that matches your organization’s domain and place the auditor’s real email address in the Alternate Email field.
Before creating an auditor account, ensure the following:
A new user requires an available web license.
To check:
Navigate to Maintenance → User Maintenance
Open the Register Product panel
Review the number of remaining web licenses displayed
If no licenses are available, you must first free one or purchase additional licenses.
Because Microix requires login accounts to match the organization’s email domain, create a fake email account ONLY in Microix using the correct format.
Example:
If your domain is @abc.gov
Create an email such as auditor1@abc.gov
Enter the auditor’s real email in the Alternate Email Address field so they can receive system notifications and welcome instructions.
Navigate to Maintenance → User Maintenance
Click the “+” icon located in the data grid to create a new account
Enter the auditor’s Information:
First Name
Last Name
Fake organizational-domain email address
Real email address in Alternate Email Address
Click Save
Go to User Security
Search for "Document Search" (see image below)
Select the auditor’s name
Click Add
This provides visibility into transactions and related details.
While in the User Security Page, select the role "Button/Function List"
Search for "Show All" (see image below)
Select the auditor’s name
Click Add
This ensures the auditor can view all allowed transactions without limitations but still in read-only mode.
Once permissions are assigned:
Option 1:
Return to User Maintenance
Select the auditor’s account
Click “Welcome Email”
Option 2:
Edit the auditor’s account
Choose “Re-send Welcome Email”
This email contains login instructions so the auditor can access the system.
When the auditor no longer needs access, you may:
Inactivate the user account (recommended for potential future audits), or
Delete the account entirely
This is managed in Maintenance → User Maintenance.