Permission-Based Security

Unifier Essentials offers a flexible yet powerful permission-based security system, as opposed to role-based security. Role-based security by definition limits the user to a fixed set of functions or tasks. With permission-based security, access to all modules, functions, and tasks is controlled by granting each user any combination of permissions.

For ease of use, permissions can be set for both individuals and for groups of users. You can even copy permissions from one user to another, and then make modifications.

A user may belong to any (or all) of the administration groups and perform functions as a company, or project, or shell administrator. Company Administrators generally have project/shell permissions, and may or may not work within the specific projects/shells. You may want a project/shell administrator to have the ability to perform some company administrator functions, such as creating a project/shell. Creating different types of user permission templates will help you to grant access more easily to different staff members, whether they are administrative staff, engineers or architects, managers, vendors or subcontractors, IT personnel, and so on.

Use default permissions as a guideline, but your users' actual permission settings will depend on your organization's needs.



Last Published Tuesday, June 4, 2024