Security Roles

Security roles are a grouping mechanism that allows you to define specific roles within the organisation.

A security role is associated with a group of users that perform the same functions and therefore need the same access rights to system functions. These could be artisans, operators, supervisors, planners and system administrators, for example.

Permissions are allocated to a security role. The permissions on a security role define which system functions that particular security role has access rights to. When the security role is assigned to a user, the permissions on the security role dictate what the user is able to do in On Key.

Configuring Security Roles

The process for configuring security roles is as follows:

  1. Add a new security role.
  2. Enable the Is Permission Tree Role setting if the permission tree applies when this security role is allocated to users.
  3. Once the security role is created, assign permissions to the security role. If Is Permission Tree Role is disabled, the security role will only have access to permissions for certain modules. If Is Permission Tree Role is enabled, the security role has access to permissions for a wider range of modules.
  4. Define the excluded properties on permissions if there are areas within the assigned system functions that the security role should not have access to.