Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 15 Next »

Why does a System Administrator need to modify an existing User/Contact?

The System Administrator needs to modify Users when their personal information, roles, or security/access has changed. 

How does a System Administrator access the User's information?

The System Administrator uses the Manage Users/Contacts page to access the User's information.  Click the user name link to make changes to the selected user's information.

Manage Users/Contacts Page

 

 

Refer to the Add New User/Contact section for a description of the fields on the Invite/Edit User page.

What makes up the Invite/Edit User page?

The Invite/Edit User page is made up of 4 sections: Personal Information, Roles, Row Level Security and Authorized Lookup Security.  This information is also discussed in the Add New User/Contact documentation. 

 

 

 Personal Information

The System Administartor is required to enter all of the following personal information for the new user.

FieldBehavior

First Name (Required)

  • Enter user's preferred first name

Last Name (Required)

  • Enter the user's preferred last name
Email ID (Required)
  • Enter a valid email address
  • Used in order to send the appropriate onboarding email
  • User will need to verify this email address as a part of the two step authentication
Phone (Required)
  • Enter a valid phone number
  • User will need to verify this phone number as a part of the two step authentication
System Access
  • Checked: Allows the new User access to the system
  • Unchecked: The new User will not be able to operate inside the system, but will act as a contact

 Onboarding Roles

The System Administrator is required to define the Role Type of the new user.

FieldBehavior
Onboarding Roles

Defines the Role Type of the new Business User:

  • Content Administrator
  • E-Verify Specialist
  • HR Specialist
  • Help Desk Analyst
  • I-9 Specialist
  • Process Administrator
  • Recruiter
  • System Administrator

*Note: A detailed list of each User Type can be found here.

You can assign as many roles to the user as you want.

To add, delete or change roles for a user, click on Add or Delete. Use the drop down to change an existing Role to a new Role without adding or deleting Roles.

 

 


FieldBehavior
Add
  • Adds a new row and allows you to assign a separate role for the user
  • If a user has more than one role assigned they will have to choose which role they want to start with at sign on and can switch to the other role at anytime in they need to perform an action with the other role
Delete
  • Deletes that role
  • A user must have at least one Role assigned in order to save any changes
Roles
  • Use the drop down to choose a Role
  • If the user is simply changing Roles, use the dropdown to pick the new Role for this user
    • i.e. Change the user from a Process Administrator to a System Administrator

 Row Level Security

  The System Administrator is required to fill out all fields in the Row Level Security section.  These define the range of the new user’s interactions.  These fields will determine the consoles that appear in the 'Authorized Security Lookup' section. 

FieldBehavior
Company (Required)
  • Enter or Search for Full Company ID Number
  • Used to define the Company in which the User will be able to interact
Business Unit (Required)
  • Enter or Search for Full Business Unit ID
  • Used to define the Business Unit in which the User will be able to interact
Department (Required)
  • Enter or Search for Full Department ID
  • Used to define the Department in which the User will be able to interact
Location (Required)
  • Enter or Search for Full Location ID
  • Used to define the Location in which the User will be able to interact

 

When searching (clicking on the lookup), it displays Lookup Security Group page. This allows the System Administrator to define the scope of the new user to be as wide or as narrow as desired.

 

 

 Authorized Lookup Security

The System Administrator has the option to fill out any and all of the fields in the Authorized Security Lookup. This section displays Security Groups similar to the Row Level Security. By selecting certain values, you can alter what certain Users are able to see when they are performing their roles in the Smart Onboarding system.

Role TypeEffect of Security Lookup Fields

System Administrator

Process Administrator

Content Administrator

HR Specialist

Recruiter


What information can a System Administrator change?

This depends on the status of the invitation.

If the user's invitation status is not Invitation Completed, you can change any of the user's information:  personal information, roles, and/or security.

 

 

 

If the user's invitation status is Invitation Completed, you can change all of the user's information except their email and phone information.  The user can change those using the My Profile feature.

 

 

 

 

  • No labels