User Security

  Previous topic Next topic JavaScript is required for the print function Mail us feedback on this topic! Mail us feedback on this topic!  

To ensure that workflow and messaging works as expected, security settings must be configured to specify request versus schedule permissions. Additionally, room, resource, and/or event request form profiles may be applied to request and schedule permissions to define which of these items is involved in the process.

 

For example, in order for request messages to be generated, the user originating the request must have only the “request” permission for the items in question. Through the application of a profile to the room, resource, or event request permissions, users can be configured to allow a combination of request, schedule, or no permissions for these items. In the absence of a profile, the permission to request or schedule is applied to all rooms, all resources, or all request forms.

 

For more detailed information about setting up Roles and Users, see the chapter “User Security”.

Page url: ?workflowandmessaging_usersecurity.htm