How are users differentiated to limit their functionality and access to information?

lisadmin on Wed, 06/07/2017 - 01:31

With a roles-based security and permissions system, each user is mapped to a role based upon the types of tasks that the user will perform inside of the system. These may be changed at any time. Once the roles are established for users i.e., staff, suppliers, inter-company sites, etc., then each user is assigned to an individual role. A user may only be assigned to one role. Each role defines a user’s access to reports, menu items, types of quality functions that may be performed, etc.

© 2019 Lyons Information Systems, Inc.