Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Click on the Setup Icon
  2. Click on the Security menu item.
  3. Click on the Users menu item.
    Image Removed
    Image Added

  4. Enter the details in the search bar for the user i.e. first name. (Note not all fields need to be completed to search).
  5. The system will generate a list of user(s) based on the search criteria entered in step 4.
    Image Removed
    Image Added


     

Assign Application Permissions

  1. Click on the Setup Icon
  2. Click on the Security menu item.
  3. Click on the Users menu item.
    Image Removed
    Image Added

  4. Enter the details in the search bar for the user i.e. first name. (Note not all fields need to be completed to search).
  5. Select the user by clicking on the blue hypertext. (Last Name or First Name).
    Image Removed
    Image Added
  6. Select the Application Permission tab.
  7. Select a role for each desired location from the dropdown list under the Module Permission tab.
  8. Click on the Save button.
    Image Removed
    Image Added



Info
titleAssign Application Permissions Key Fields

Note: In the Current Release there are roles available for Incident Management, Activity Management, and Performance Management. Other Modules that are displaying are for future release. All Smith’s employees are created as user of the system with the least amount of permissions. These roles will be marked Feed User in the role Title. 

  • Any role name containing User will allow those users to add/edit records for that module.
  • Any role name with Viewer will allow only view only access.
  • Any role name with Admin are allowed to add/edit all records for that location

...