...
- Click on the Setup Icon
- Click on the Security menu item.
- Click on the Users menu item.
- Enter the details in the search bar for the user i.e. first name. (Note not all fields need to be completed to search).
- The system will generate a list of user(s) based on the search criteria entered in step 4.
Assign Application Permissions |
- Click on the Setup Icon
- Click on the Security menu item.
- Click on the Users menu item.
- Enter the details in the search bar for the user i.e. first name. (Note not all fields need to be completed to search).
- Select the user by clicking on the blue hypertext. (Last Name or First Name).
- Select the Application Permission tab.
- Select a role for each desired location from the dropdown list under the Module Permission tab.
- Click on the Save button.
Info | ||
---|---|---|
| ||
Note: In the Current Release there are roles available for Incident Management, Activity Management, and Performance Management. Other Modules that are displaying are for future release. All Smith’s employees are created as user of the system with the least amount of permissions. These roles will be marked Feed User in the role Title.
|
...