Configuration - Security Roles

Configuration is delivered by Citation HR Software's Implementations team who work in partnership with businesses to identify their HR and Safety needs and scope out their requirements and instructions prior to building and customising their Citation HR Software account.  Before commencing the configuration process, businesses need to consider a range of factors as set out in the following article:  What factors should be considered when seeking Citation HR Software configuration?

Citation HR Software’s user access is determined by a complex system of compounding security roles which control what a user is able see and do. A user’s available functionality is controlled by having one or more security roles assigned to them.

Clients can have their own custom account roles. What can be configured is totally dependent on a business' requirements. Every case is different so it is better to have a discussion with an Implementation Consultant to scope out your requirements and provide the best possible solution.





In the case where you wish to put further controls on whether or not a user can see certain tabs, record types or document types, you can request a customised security role to be created for you.

Additionally, some functions in the system allow you to restrict notifications to specific security roles. In the case where certain users are required to receive notifications, we can also make a role with no additional access to the system specifically for the purpose of receiving notifications.



If you would like to learn more about how Citation HR Software can be configured to meet your requirements, please contact Citation HR's Client Experience team at