Skip to main content

TELUS Food Safety & Quality - Office - Adding Users and setting Permissions (Process Map)

A
Written by Alan Baldwin
Updated over 6 months ago
Adding_Users_and_setting_permissions.jpg

This flowchart illustrates the comprehensive process for adding users and setting permissions within the system. The diagram presents a multi-path workflow that guides administrators through the essential steps of user creation and permission assignment.

The process begins by hovering over the Users section and selecting User Administration, which leads to the option to add a new user. Administrators must then select the appropriate account type as "User" and proceed to enter the user's full name, choose their user level, and create a unique username.

The workflow branches into permission configuration, where users can access Data Permissions either directly through the initial user creation process or alternatively via the User Permissions Administration section. The system prompts administrators to press "Save and Email" and subsequently select the appropriate member group that reflects the user's role within the organization.

Company selection is an optional step. The process continues with entering the user's email address, while notably leaving the password field blank since the system will automatically prompt new users to establish their own password upon first login.

The permission configuration extends to location-based access, where administrators can change the permission type to Location Permissions and select either the newly created user or an existing user whose permissions require modification. The workflow includes clicking on specific location tiles where the user should have access and applying any additional permissions as required by adjusting the Permission Type settings.

The process concludes with saving all changes, after which the user is successfully created and granted access to the relevant parts of the system. The diagram emphasizes that users gain access to their designated areas immediately upon completion.

Administrators should always endeavour to add new users to appropriate groups, as this determines their application permissions. The system automatically sends login credentials via email and prompts users to establish their passwords. Additionally, users not added to User Groups will only receive Data Permissions, requiring individual setup of Application Permissions through the User Permissions Administration interface.

Did this answer your question?