Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Find it:  System Configuration >> Infinity

REACH Infinity

Infinity is the name of the REACH User Access Security System. This is a robust and flexible system that allows you to have control across the entire user base to manage the Access, Behaviour and Control functions of every individual user in REACH. Infinity allows you to manage these permissions in bulk by setting and allocating a Security Profile for each type of user in your system. 



Image Added



Image Added   

A unique and powerful feature in REACH is that you can manage user permissions for an entire group of users (at the User Role level) or at the individual level using the individual's personal profile.  


Base Security Profiles

User Access Control is maintained by creating sets of permissions that are saved as security profiles (known as a Base Security Profile). 

Each

You can have an unlimited number of Base Security Profiles and each Profile can have a different set of Access, Behaviour and Control permissions as

the

its default settings

for the profile and as

.

As you create different types of

user roles

User Roles in REACH (eg: Faculty, Leave Approver, Administrator) you can then allocate a Security Profile and its related set of permissions to each of the User Roles.

Image Removed

Image Removed   

A unique and powerful feature in REACH is that you can manage user permissions for an entire group of users (at the User Role level) or at the individual level using the individual's personal profile.  

How to create a Base Security Profile


Image Added

Managing User Roles

You can create an unlimited number of User Roles in REACH. For each User Role that you create you need to apply a Base Security Profile (eg: Administrator) to the role which sets out the and set the permissions for that profile across various modules in REACH.

How to Create a new User Role

  1. Go to System Config >> Infinity and select the Roles Tab on the left side.
  2. Select the Add New Role button
  3. Give the Role a name and set the Base Security Profile for the User Role




Each category of capability has a set or permissions and each of these individual permission need to be enabled or disabled to create the Base Security Profile.  These settings then determine what type of user the profile is in REACH (eg: can act as a Boarder, Staff or Parent Role) and what they are able to perform in REACH.

Image Removed