Permissions
Customize access rights and maintain data security.
| Concept | Explanation | Action |
|---|---|---|
| Security Roles | Pre-defined groups of permissions (e.g., Technician has read/write to work orders, no access to financial reports). | Review and update role permissions to align with job functions. |
| Principle of Least Privilege | Users should only have the minimum permissions necessary. | Audit roles regularly; revoke unnecessary access. |
| Permission Hierarchy | Understanding inheritance/overrides; Admin typically overrides lower roles. | Ensure custom roles don't inherit unwanted access. |
| Data Access Limits | Permissions at data level (e.g., only team-specific work orders). | Use data filters and scoping rules to restrict sensitive datasets. |