Find it: System Configuration >> Infinity
REACH Infinity
Infinity is the name of the REACH User Access Security System. This is a robust and flexible system that allows you to have control across the entire user base to manage the Access, Behaviour and Control functions of every individual user in REACH.
There are two components in the structure of Infinity Access Control.
Base Security Profiles
Base Security Roles are sets of permissions that are saved as a security profile. You can have an unlimited number of Base Security Profiles and each Profile can have a different set of Access, Behaviour and Control permissions as its default settings.User Roles
As you create different types of User Roles in REACH (eg: Faculty, Leave Approver, Administrator) you can then allocate a Base Security Profile to each User Role. This sets the default permissions for Access, Behaviour and Control functions to each of the User Roles.
You can have an unlimited number of Base Security Profiles and User Roles in REACH.
A unique and powerful feature in REACH is that you can manage user permissions for an entire group of users (at the User Role level) or at the individual level using the individual's personal profile.
Base Security Profiles
User Access Control is maintained by creating sets of permissions that are saved as security profiles (known as a Base Security Profile).
As you create different types of User Roles in REACH (eg: Faculty, Leave Approver, Administrator) you can then allocate a Security Profile and its related set of permissions to each of the User Roles.
How to create a Base Security Profile
Managing User Roles
You can create an unlimited number of User Roles in REACH. For each User Role that you create you need to apply a Base Security Profile (eg: Administrator) to the role which sets out the and set the permissions for that profile across various modules in REACH.
How to Create a new User Role
- Go to System Config >> Infinity and select the Roles Tab on the left side.
- Select the Add New Role button
- Give the Role a name and set the Base Security Profile for the User Role
Each category of capability has a set or permissions and each of these individual permission need to be enabled or disabled to create the Base Security Profile. These settings then determine what type of user the profile is in REACH (eg: can act as a Boarder, Staff or Parent Role) and what they are able to perform in REACH.