Creating
Custom User Security Roles for Verification
By default the program allows "Employee"
users to verify as Verification Level 1, and "Supervisor"
users to verify as Verification Level 2. "Admin"
users can verify as any Verification Level. If
further levels of verification are desired, customized
User Security Roles can be created.
Creating a New Security Role
Note: The
Security Role that a user is assigned to effects
the level of access that the user will have to
all areas
of the program.
- From the main "Admin" tab, click
on the "Roles" link located under
the System
Tools heading.
- To create a new role, click on the [ADD]
icon located below the Search
field at the top of the screen. The "Permissions"
screen opens.
- Enter a Name
for this Security Role as you would like it
to appear in the program. Complete the Role Information
section of the screen as desired.
- If you would like to use an existing role
as a template, select the desired role from
the Copy
Permissions From drop-down menu and
click on the "Copy" link. The permissions
from the selected role are populated in the
screen below.
- The Permissions
heading appears at the bottom of the screen.
The screen may be minimized. Click on the
icon
to maximize the screen.
- Browse the available permissions until
you come to the section labeled Main
Category: Time Card and Sub
Category: Verification. This section
is where verification permissions are specified.
- Verification Levels 1 - 5 are listed. Put
a check mark in the box next to each level
that you would like users assigned to this
role to be allowed to verify as.
- Permissions can be set up independently
for the user's own time and attendance information
(or, "Self") and the information
of the employees that they are assigned to
supervise in the system ("Assigned").
Select "Yes" or "No" for
each level, as desired.
- Put a check mark in the Edit
Locked Pay Period and Department Verification
settings, as desired.
Once you have specified the desired permissions
for this role, click on the [CREATE] icon at the
top of the screen.
The custom Security Role is added to the list
of available roles, and can now be selected when
creating users.
Related Topics
- This topic covers the creation of Security
Roles as pertains to use with Verification
Policies only.
Refer to Customized
Security Roles for full documentation
on creating roles in the system.
|