Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Find it:  System Configuration >> Infinity

REACH Infinity

Infinity is the name of the REACH User Access Security System. This is a robust and flexible system that allows you to have control across the entire user base to manage the Access, Behaviour and Control functions of every individual user in REACH. Infinity allows you to manage these permissions in bulk by setting and allocating a Security Profile for each type of user in your system. 

User Access Control is maintained by creating sets of Permissions that are saved as Security Profiles (known as a Base Security Profile).  As you create different types of user roles in REACH (eg: Faculty, Leave Approver, Administrator) you can then allocate a Security Profile and its set of permissions to each of the User Roles.

A unique and powerful feature in REACH is that you can manage user permissions at:

The Macro level (User Roles), or the Micro Level (Individual User).  

This provides you with the efficiency of bulk managing  Access, Behaviour and Control capabilities of common user types with the flexibility to accurately control the Access, Behaviour and Control capabilities of any individual user also.

Image Removed

Managing Users in REACH

Create for an entire group of users (at the User Role level) or at the individual level using the individual's personal profile.  

Image Added

Managing User Roles

You can create an unlimited number of User Roles in REACH. For each User Role that you create you need to apply a Base Security Profile (eg: Administrator) to the role which sets out the and set the permissions for that profile across

thirteen (13) categories of capability in REACH.

various modules in REACH.

How to Create a new User Role

  1. Go to System Config >> Infinity and select the Roles Tab on the left side.
  2. Select the Add New Role button
  3. Give the Role a name and set the Base Security Profile for the User Role




Each category of capability has a set or permissions and each of these individual permission need to be enabled or disabled to create the Base Security Profile.  These settings then determine what type of user the profile is in REACH (eg: can act as a Boarder, Staff or Parent Role) and what they are able to perform in REACH.