Configuration Overview

BRC Risk Management requires configuration of API connections, risk levels, and user access before it can fetch and display risk data. The assisted setup wizard guides you through these essential steps.

Assisted Setup Wizard

Starting the Wizard

  1. Access Assisted Setup

    • Search for “Assisted Setup”
    • Find “BRC Risk Setup” in the list
    • Click Start or Set up
  2. Wizard Steps Overview

    • Welcome and overview
    • API Configuration
    • Risk Level Setup
    • Notification Configuration
    • User Permissions
    • Completion and testing

Wizard Navigation

API Configuration

Provider Setup

TIC API Configuration (Primary Provider):

  1. API Endpoint: Enter TIC API base URL (e.g., https://api.ticprovider.com/v1)
  2. API Key: Enter your TIC API key securely stored in encrypted storage
  3. Authentication: API key authentication in request headers
  4. Rate Limits: Configure monthly call limits per your TIC subscription

Alternative Provider Setup:

API Settings Fields

Risk Setup Configuration:

Test API Connection

Connection Validation:

  1. Click Test Connection in setup wizard or Risk Setup page
  2. System performs test query to verify:
    • API endpoint accessibility
    • Authentication credential validity
    • Response format compatibility
    • Network connectivity

Test Results:

Risk Level Configuration

Default Risk Levels

The system creates four default risk levels during setup:

CodeDescriptionStyleRisk ActionPriority
CRITICALCritical RiskStrong AccentBlock1 (Highest)
HIGHHigh RiskUnfavorableWarn2
MEDIUMMedium RiskAttentionStyle Only3
LOWLow RiskFavorableNothing4 (Lowest)

Customizing Risk Levels

Available Styles:

Risk Actions:

Risk Level Thresholds

Configure thresholds to automatically assign risk levels based on:

Credit Score Ranges:

Debt Balance Thresholds:

Payment Marks:

Adding Custom Risk Levels

  1. Open Risk Level List

    • Search for “Risk Levels”
    • Click New to create custom level
  2. Configure Risk Level

    • Code: Unique identifier (10 characters max)
    • Description: User-friendly name
    • Style: Visual representation
    • Risk Action: Functional behavior
    • Priority: Evaluation order (1=highest risk)
  3. Set Threshold Criteria

    • Define conditions triggering this risk level
    • Configure score ranges, debt limits, payment marks
    • Test threshold logic with sample data

Notification Configuration

Notification Types

Available Methods:

Email Notifications

Email Setup:

  1. Configure SMTP settings in Business Central
  2. Set default sender address
  3. Define recipient groups or individual addresses
  4. Customize email templates for different risk scenarios

Email Triggers:

Webhook Configuration

Webhook Setup:

Webhook Payload Example:

{
  "eventType": "RiskLevelChanged",
  "entityId": "12345",
  "companyName": "Example Company Ltd",
  "oldRiskLevel": "MEDIUM",
  "newRiskLevel": "HIGH",
  "timestamp": "2025-12-01T10:30:00Z",
  "creditScore": 45
}

User Permissions Configuration

Permission Set Assignment

Available Permission Sets:

Role-Based Configuration

Risk Manager Role:

Credit Manager Role:

General User Role:

Permission Verification

Test User Access:

  1. Assign permission sets to test users
  2. Verify appropriate page access levels
  3. Test functional limitations per role
  4. Validate data security restrictions

Advanced Configuration

Job Queue Setup

Scheduled Risk Updates:

  1. Configure Job Queue entries for automated risk data fetching
  2. Set update frequencies (daily, weekly, monthly)
  3. Define retry policies for failed updates
  4. Monitor execution logs and results

Background Processing:

Integration Events

Available Events:

Custom Logic Integration:

Configuration Validation

Setup Verification Checklist

After completing configuration:

Configuration Testing

Recommended Tests:

  1. API Test: Fetch risk data for known company
  2. Risk Level Test: Verify threshold calculations
  3. Permission Test: Confirm user access restrictions
  4. Notification Test: Trigger test notifications
  5. Integration Test: End-to-end workflow validation

Configuration Maintenance

Regular Maintenance Tasks

Monthly:

Quarterly:

Annually:

Next Steps

After completing configuration:

  1. Assign User Permissions - Set up role-based access
  2. Begin User Training - Start with getting started guide
  3. Create Initial Watchlists - Set up proactive monitoring
  4. Link Existing Data - Connect customers and vendors

Configuration typically takes 15-30 minutes. Have API credentials and business requirements ready before starting.