Permission-Based Security

The application offers a flexible yet powerful permission-based security system, as opposed to role-based security. Role-based security by definition limits the user to a fixed set of functions or tasks. With permission-based security, access to all modules, functions and tasks is controlled by granting each user any combination of permissions.

Some areas of the system, such as the Company Information node, include View permission for all users by default.

For ease of use, you can set permissions for both individuals and for groups of users. You can even copy permissions from one user to another and then make modifications.

A user may belong to any (or all) of the administration groups and perform functions as a company, project, or shell administrator. Company Administrators generally have project and shell permissions and may or may not work within the specific shells. You may want a project or shell administrator to have the ability to perform some company administrator functions, such as creating a project or shell. Creating different types of user permission templates will help you grant access more easily to different staff members, whether they are administrative staff, engineers or architects, managers, vendors or subcontractors, IT personnel, and so on.

Use default permissions as a guideline, but your users' actual permission settings will depend on your organization's needs.



Last Published Tuesday, April 15, 2025