Why does a System Administrator need to modify an existing User/Contact?
The System Administrator needs to modify Users when their personal information, roles, or security/access has changed.
How does a System Administrator access the User's information?
The System Administrator uses the Manage Users/Contacts page to access the User's information. Click the user name link to make changes to the selected user's information.
Manage Users/Contacts Page |
---|
Refer to the Add New User/Contact section for a description of the fields on the Invite/Edit User page.
What makes up the Invite/Edit User page?
The Invite/Edit User page is made up of 4 sections: Personal Information, Roles, Row Level Security and Authorized Lookup Security. This information is also discussed in the Add New User/Contact documentation.
Personal Information
The System Administartor is required to enter all of the following personal information for the new user.
Field | Behavior |
---|---|
First Name (Required) |
|
Last Name (Required) |
|
Email ID (Required) |
|
Phone (Required) |
|
System Access |
|
Onboarding Roles
The System Administrator is required to define the Role Type of the new user.
Field | Behavior |
---|---|
Onboarding Roles | Defines the Role Type of the new Business User:
|
*Note: A detailed list of each User Type can be found here.
You can assign as many roles to the user as you want.
To add, delete or change roles for a user, click on Add or Delete. Use the drop down to change an existing Role to a new Role without adding or deleting Roles.
Field | Behavior |
---|---|
Add |
|
Delete |
|
Roles |
|
Row Level Security
The System Administrator is required to fill out all fields in the Row Level Security section. These define the range of the new user’s interactions. These fields will determine the consoles that appear in the 'Authorized Security Lookup' section.
Field | Behavior |
---|---|
Company (Required) |
|
Business Unit (Required) |
|
Department (Required) |
|
Location (Required) |
|
In the lookup any Security Group that has been defined for the corresponding attribute can be specified. This allows the System Administrator to define the scope of the new user to be as wide or as narrow as required.
Security Group Look Up for Business Unit |
---|
Authorized Lookup Security
The System Administrator has the option to fill out any and all of the fields in the Authorized Security Lookup. This section displays Security Groups similar to the Row Level Security. By selecting certain values, you can alter what certain Users are able to see when they are performing their roles in the Smart Onboarding system.
Role Type | Effect of Security Lookup Fields |
---|---|
System Administrator Process Administrator Content Administrator |
|
HR Specialist Recruiter |
|
What information can a System Administrator change?
This depends on the status of the invitation.
Invitation Status | What can be modified |
---|---|
Invitation Created Invitation Launched |
|
Invitation Status | What can be modified |
---|---|
Invitation In Progress Invitation Completed |
|