Follow

Configuration - Security Roles

Configuration is delivered by HRA Cloud's Implementations team who work in partnership with businesses to identify their HR and Safety needs and scope out their requirements and instructions prior to building and customising their HRA Cloud account.  Before commencing the configuration process, businesses need to consider a range of factors as set out in the following article:  What factors should be considered when seeking HRA Cloud configuration?

HRA Cloud’s user access is determined by a complex system of compounding security roles which control what a user is able see and do. A user’s available functionality is controlled by having one or more security roles assigned to them.

Clients can have their own custom account roles. What can be configured is totally dependent on a business' requirements. Every case is different so it is better to have a discussion with an Implementation Consultant to scope out your requirements and provide the best possible solution.

 

mceclip0__4_.png

mceclip1__1_.png

 

In the case where you wish to put further controls on whether or not a user can see certain tabs, record types or document types, you can request a customised security role to be created for you.

Additionally, some functions in the system allow you to restrict notifications to specific security roles. In the case where certain users are required to receive notifications, we can also make a role with no additional access to the system specifically for the purpose of receiving notifications.

mceclip2__1_.png

 

If you would like to learn more about how HRA Cloud can be configured to meet your requirements, please contact HR Assured's Client Experience team at support@hrassured.com.au.

 

Have more questions? Submit a request