Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Find it:  System Configuration >> Infinity

REACH Infinity

Infinity is the name of the REACH User Access Security System. This is a robust and flexible system that allows you to have control across the entire user base to manage the Access, Behaviour and Control functions of every individual user in REACH. Infinity allows you to manage these permissions in bulk by setting and allocating a Security Profile for each type of user in your system. 

User Access Control is maintained by creating sets of Permissions that are saved as Security Profiles (known as a Base Security Profile).  As you create different types of user roles in REACH (eg: Faculty, Leave Approver, Administrator) you can then allocate a Security Profile and its set of permissions to each of the User Roles.

A unique and powerful feature in REACH is that you can manage user permissions at:

The Macro level (User Roles), or the Micro Level (Individual User).  

This provides you with the efficiency of bulk managing  Access, Behaviour and Control capabilities of common user types with the flexibility to accurately control the Access, Behaviour and Control capabilities of any individual user also.




Managing Users in REACH

Create a Base Security Profile (eg: Administrator) and set the permissions for that profile across thirteen (13) categories of capability in REACH.

Each category of capability has a set or permissions and each of these individual permission need to be enabled or disabled to create the Base Security Profile.  These settings then determine what type of user the profile is in REACH (eg: can act as a Boarder, Staff or Parent Role) and what they are able to perform in REACH.


  • No labels