Creating Custom User Security Roles for Verification

By default the program allows "Employee" users to verify as Verification Level 1, and "Supervisor" users to verify as Verification Level 2. "Admin" users can verify as any Verification Level. If further levels of verification are desired, customized User Security Roles can be created.

Creating a New Security Role

Note: The Security Role that a user is assigned to effects the level of access that the user will have to all areas of the program.

  1. From the main "Admin" tab, click on the "Roles" link located under the System Tools heading.
  2. To create a new role, click on the [ADD] icon located below the Search field at the top of the screen. The "Permissions" screen opens.
  3. Enter a Name for this Security Role as you would like it to appear in the program. Complete the Role Information section of the screen as desired.
  4. If you would like to use an existing role as a template, select the desired role from the Copy Permissions From drop-down menu and click on the "Copy" link. The permissions from the selected role are populated in the screen below.
  5. The Permissions heading appears at the bottom of the screen. The screen may be minimized. Click on the icon_black_down.jpg icon to maximize the screen.
  6. Browse the available permissions until you come to the section labeled Main Category: Time Card and Sub Category: Verification. This section is where verification permissions are specified.
  7. Verification Levels 1 - 5 are listed. Put a check mark in the box next to each level that you would like users assigned to this role to be allowed to verify as.
  8. Permissions can be set up independently for the user's own time and attendance information (or, "Self") and the information of the employees that they are assigned to supervise in the system ("Assigned"). Select "Yes" or "No" for each level, as desired.
  9. Put a check mark in the Edit Locked Pay Period and Department Verification settings, as desired.

Once you have specified the desired permissions for this role, click on the [CREATE] icon at the top of the screen.

The custom Security Role is added to the list of available roles, and can now be selected when creating users.

Related Topics

  • This topic covers the creation of Security Roles as pertains to use with Verification Policies only. Refer to Customized Security Roles for full documentation on creating roles in the system.

icon_previous_topic.jpg