Each request made by a user or group of users in the system will be verified and checked, by 3 different authorization procedures in order to obtain approval.
1. User Permission.
2. Resource permissions.
3. Admin Permission.
Permission to manage Each business requires different sets of rules and permissions to allow employees to work with the system. These requirements are typically customized and need to meet specific use cases and regulations that the business is obligated to comply with.
Our permission management system allows you to have full, simple, dynamic and adaptive control over each user setting and permissions to the system. Authorization processes:
1. User Authorization - Each user who logs in to our system, receives an encrypted token. The token accompanies it whenever an action request is made. After the token is verified in our system, confirmation of the operation will be given.
2. Resource Authorization - Whenever a user works on the system, our permission management authorizes access to the requested resources in accordance with those user permissions. Even if the resources are changed by other users of the system, we will ensure that the accessibility and visibility of the resources remains personal and private.
The process is carried out like this:
A. After successful login to the system, this authorization will provide the user with his personal resources.
B. Any request to access resources made by that user will be reviewed and approved in accordance with the user's or group's permissions.
3. Admin Permission - Every request in the system is authenticated and approved according to the user's predefined setting or his user permission set. It controls the ability to access the system, what resources are accessible to it and what actions can be performed by it.
Permissions are divided into 4 categories:
A. Rejected - no access.
B. View only - access to resources without actions.
C. Editor - access to resources and changes.
D. Administrator - In addition to all editor-level permissions, changes to the permission management system are also allowed.
The process is carried out like this:
A. The login attempt is made by an employee with a personal username and password to the system.
B. Permission to added information is processed according to predetermined rules in our permission management system.
C. After verification, the user will only be able to see and control the resources that have been approved for him. Group permissions rules actually collect generic rules and permissions for key people who have similar rules, resources, and corresponding permissions to create permission templates.
A permission group will include:
A. Add relevant users to a group containing specific rules.
B. Creating departments in your business.
C. Saved rule and group templates for future general user registrations.
D. Remove specific users from rule groups.