How to grant your supervisors/ office admin access to the system
How to grant your supervisors/ office admin access to the system
Please follow the below steps to create a custom security role for your contractor or subcontractor.
1-Create a new security role for the supervisor / office user and grant the level of access for the role they will be performing. See how to createSecurity Roles.
Notes.
The System comes per-defined with many predefined security roles.
These roles have specific access to different screens and functions, within
the system. You can edit , rename and and adjust any of them to fit your needs.
2-Create a new user for and assign the above-created security profile/role to the user.
When you create a new user, the system will automatically send an email invitation to
the new user to allow him to create a password and start working with the system
3-Save the new user record.
4- Default Access For new users.
By default, newly created users have access to all sites and employees.
To restrict their access to specific sites, teams, or employees, navigate to the
Assigned Sites & Jobs tab.
This section allows you to:
Assign specific sites or jobs to the user.
Allocate particular teams or departments to the user or grant the user access to all employees if needed.
Once the user logs into the system, they will only be able to view and interact with their assigned sites, teams, and employees.
Example:
Mike has access to view the time attendance and scheduler screens. He is assigned to access two
sites and access to all employees only: HSBC Bank and IBM Head Quarter Bldg.
When Mike logs into the system:
On the time attendance screen, he will only be able to access employee records that clocked into the two sites.
On the Scheduler screen, he will only be able to see the above two sites roster and will be able to roster and schedule all the employees
To grant your client access to the system for viewing the roster and other data, follow these steps: 1. Navigate to "Settings" > "Users & Permissions". 2. Add the user's information, including their first and last name, email, and select the security ...
ClickTime uses a role-based method to control access to the data. This ensures that only authorized users can carry out specified functions and that sensitive data is not visible to people who do not have the privilege to view it and maintain it. ...
Our ClickTime web and mobile application were built to take into consideration small, medium and large organizations. Medium and large organizations have two types of employees as follows: Remote or field workers These employees will be able to use ...
Adhoc Shift Feature The Adhoc Shift feature allows employees to clock in for unscheduled shifts, providing flexibility for both the company and the employees. This feature is particularly useful when an employee's shift was not published or when the ...
From the main menu, select setting > Users & Permissions Clicking on the +New User button Fill out the user details and information. Make sure to assign a security profile/role to the new added user. Make sure the user email is defined Click on Save ...