Access User

The Access User feature allows administrators to manage user access to different branches, URL controls, and access rules within the system. Below is a comprehensive guide on how to effectively use the Access User module:

Access User
  1. Accessing the Access User Section:

    • Log in to the system with administrative privileges.

    • Navigate to the Access User management section within the system.

  2. Understanding Access User Fields:

    • User Name: The username of the authenticated user.

    • Branch Type: Specifies the type of branch associated with the user.

    • Branch: Refers to the specific branch the user has access to.

    • URL Control: Indicates the URL control associated with the user's access.

    • Access Rule: Specifies the access rule or permission granted to the user.

    • Post Status: Indicates the status of the post.

    • Inactive: Indicates whether the user's access is active or inactive.

  3. Searching and Filtering:

    • Utilize the search and filter options to quickly locate specific Access User entries.

    • You can search by username, branch type, branch, or other parameters to narrow down the results.

  4. Adding a New Access User Entry:

    • Click on the "ADD" button to create a new Access User entry.

    • Fill in the required fields such as username, branch type, branch, URL control, and access rule.

    • Specify the post status and set the user's access as active.

  5. Editing Existing Access User Entries:

    • Locate the Access User entry you wish to edit from the list.

    • Click on the "Edit" option corresponding to the entry.

    • Update the fields as necessary, such as changing the access rule or branch type.

    • Save the changes once you're done.

  6. Activating or Deactivating Entries:

    • Toggle the "Inactive" option to activate or deactivate an Access User entry.

    • Deactivating an entry restricts the user's access within the system.

  7. Deleting Entries:

    • Exercise caution when deleting Access User entries as it may impact user access.

    • Consider deactivating entries instead of deleting them if unsure about their impact.

  8. Testing and Monitoring:

    • After creating or modifying Access User entries, test user access to ensure the settings are enforced correctly.

    • Regularly monitor Access User configurations to ensure compliance and security.

By following these steps, administrators can effectively manage user access permissions within the system, ensuring appropriate access controls based on defined parameters.

Last updated

Was this helpful?