Table of Contents:
Centralized Access Management
Centralized Role Assignment
Key Features
Benefits
Getting Started
Centralized Access Management
The access configuration feature centralizes your organization's access management. You can control access permissions for most features on a single page, instead of having to navigate to various modules or settings pages. This allows admins to easily find the features they are trying to regulate access for, as well as clearly see who can access what.
To navigate to this configuration page, go to 'Settings' > 'Employees' > 'Access configuration'.
Centralized Role Assignment
Module admins and suggestion box owners are now also handled as access roles and can be assigned from the profile settings. This means you no longer have to assign roles in different places. Further - you can create custom roles (in 'Settings' > 'Employees' > 'Access roles').
Features can be individually enabled for system-internal and custom roles. This means you can, for example, grant certain people access to the Competency Framework or the org chart, while hiding it for others. You can also grant someone in the Finance team access to the billing section, or a non-admin set up the Competency Framework for the company, etc. There continue to be safeguards in place regarding other features. For example, you will not be able to allow everyone to create review cycles for the whole company, or any other feature that has a 'global' scope that includes the whole company. This is to ensure safety and compliance in regards to accessing information related to users whom normal employees should not technically have access to.
Key Features
Role-based feature management
- Create custom feature sets for different user groups
- Toggle individual features on/off
- Bulk user assignment capabilities
Advanced permission controls
- Feature-level access restrictions
- Department-specific configurations
- Inheritance rules management
Usage analytics dashboard
- Feature adoption metrics
- User engagement tracking
- Access pattern analysis
Benefits
- Improved resource allocation
- Enhanced security control
- Streamlined user management
- Cost optimization through precise feature distribution
As soon as you assign a role to a user via their profile, they will automatically get all permissions assigned to this role.
Features are organized into sections within the page. You can expand the section in order to see which features are accessible and applicable for changes to users' access. Based on the modules you have enabled, you will see the relevant subsection pertaining to features within those modules.
You can also utilize the search bar to simply search for the setting/feature you would like to change access for.
Getting Started
System administrators can begin configuring feature access immediately. We recommend:
- Reviewing current feature usage patterns
- Defining user groups and their required feature sets
- Setting up initial access controls
- Monitoring adoption through the analytics dashboard