Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Find it:  System Configuration >> Infinity

REACH Infinity

Infinity is the name of the REACH User Access Security System. This is a robust and flexible system that allows you to have control across the entire user base to manage the Access, Behaviour and Control functions of every individual user in REACH. Infinity allows you to manage these permissions in bulk by setting and allocating a Security Profile for each type of user in your system. 

User Access Control is

essentially the management of User Permissions. In REACH this is maintained usingSets

maintained by creating sets of Permissions that are

allocated to

saved as Security Profiles (known as a Base Security Profile

(BSP) which are utilised byUser Roles in REACH

).  As you create different types of user roles in REACH (eg: Faculty, Leave Approver, Administrator) you can then allocate a Security Profile and its set of permissions to each of the User Roles.

A unique and powerful feature in REACH is that you can manage user permissions at:

The Macro level (User Roles), or

the Micro Level (Individual User).  

This provides you with the efficiency of bulk managing  Access, Behaviour and Control capabilities of common user types with the flexibility to accurately control the Access, Behaviour and Control capabilities of any individual user also.

Image Removed


Image Added



Managing Users in REACH

Create a Base Security Profile (eg: Administrator) and set the permissions for that profile across thirteen (13) categories of capability in REACH.

Each category of capability has a set or permissions and each of these individual permission need to be enabled or disabled to create the Base Security Profile.  These settings then determine what type of user the profile is in REACH (eg: can act as a Boarder, Staff or Parent Role) and what they are able to perform in REACH.