Access Rule

Access Rule allows administrators to define access rules for different parts of the system based on user groups or roles. Here's how to utilize Access Rule effectively:

Access Rule
  1. Accessing Access Rule Management:

    • Log in to the system with administrative credentials.

    • Navigate to the Access Rule management section or dashboard.

  2. Understanding Access Rule Fields:

    • Name: A descriptive name for the access rule.

    • Code: A unique identifier for the access rule.

    • Access Group: The user group or role to which this access rule applies.

    • URL Control: Specifies the URL control associated with this access rule.

    • Include Child Type: Indicates whether child branches inherit the access rule.

    • Self Data: Specifies whether the user has access to their own data.

    • Inactive: Indicates whether the access rule is active or inactive.

  3. Searching and Filtering:

    • Use the search and filter options to quickly locate specific access rules.

    • You can search by name, code, access group, or other relevant criteria.

  4. Adding a New Access Rule:

    • Click on the "ADD" button to create a new access rule.

    • Fill in the required fields such as name, code, and access group.

    • Specify the URL control associated with this access rule.

    • Configure other options such as including child types and self-data access.

    • Save the new access rule once all details are entered.

  5. Editing Existing Access Rules:

    • Locate the access rule you wish to edit from the list.

    • Click on the "Edit" option corresponding to the access rule.

    • Update the fields as necessary, such as changing the URL control or access group.

    • Save the changes once done.

  6. Activating or Deactivating Access Rules:

    • Toggle the "Inactive" option to activate or deactivate an access rule.

    • Deactivating an access rule restricts or revokes access according to the defined permissions.

  7. Deleting Access Rules:

    • Exercise caution when deleting access rules, as it may impact user access.

    • Consider deactivating rules instead of deleting them if unsure about the impact.

  8. Testing Access:

    • After making changes to access rules, test user access to ensure the settings are applied correctly.

  9. Documentation and Auditing:

    • Maintain documentation of access rules for reference and auditing purposes.

    • Include details such as the date of modification and the administrator who made the changes.

By following these steps, administrators can effectively manage access to different parts of the system, ensuring that users have appropriate permissions based on their roles or user groups.

Last updated

Was this helpful?