...
Status | ||||
---|---|---|---|---|
|
Introduction
User permissions
...
determine the actions
...
users can perform
...
within the system. They are
...
integral to the access control system
...
, which also
...
encompasses Field Level Security (FLS) and Object Security.
...
Every operation or
...
service that provides or updates data requires
...
a specific permission.
...
Managing
...
Permissions
Permissions can be managed by users
...
who have been assigned the Manage System Permissions permission
...
.
To manage permission assignments,
...
navigate to system
...
Administration → Users and
...
Groups → User Permissions.
Permissions are organized
...
into Permission Sets.
...
The screenshot below shows a Security Administrator set
...
comprising all Administrator permissions and several specific permissions
...
such as Anonymize User.
Assignments can be made
...
at any level,
...
allowing specific
...
users or
...
groups to be assigned to individual
...
permissions or
...
entire
...
sets.
...
When a user is assigned to a set,
...
all permissions within the set
...
are granted. It
...
is recommended to use groups and organize them
...
according to the specific needs of the organization.
...
Then
...
, these groups can be assigned to as many permissions or sets as
...
necessary.
...
Subsequently, manage permissions by adding or removing users from such groups.
...
Evaluate user permissions
If a Security Administrator is uncertain
...
about the permissions granted to a user, they can be checked by using the "check effective rights" button located on the user list.
...
This list includes direct assignments
...
as well as all permissions granted via group membership or
...
through permission sets inclusion (e.g. one
...
set includes another set).
...
Permissions and functions
Permissions marked with should be assigned with caution only to selected
...
administrators.