System Configuration
Roles
8 min
overview as the diagram below shows, roles relate users (agents, supervisors) to 2 main things remote security rules these rules are used to define what should happen when an event is detected by secure work from home's agent desktop application see remote security rules docid\ mxqk0wmz iye61wlioe2h for more information administration and reporting capabilities (more details below) a user can have 1 or more roles roles are assigned to users as part of user onboarding (see user management docid\ mvj7aa qttnlmch7xlvnf for more information) managing roles roles are managed in the role based access management module in ocm (operation control manager) assuming you have access to ocm, click on the admin modules icon in the upper right (looks like a computer screen) select "home" and then "role based access management" creating a role in role based access management, click on the button "add new role based access management record" in the dialog that appears, enter a unique name for the role and save assigning access rights to a role whether updating an existing role or adding rights to a newly created role, you will do the same thing use the search field in the upper right to locate the desired role (e g in the below image, "agent" brought up the "standard agent" role we just created) single click on the role itself to popup the access rights edit page for that role click on the pencil button on the far left of the row to edit the name of the role admin rights for roles which should provide system administration rights to assigned users, you grant access to the role on a module by module basis (see the functionality column) a checkmark in the access column allows the user to view the contents a checkmark in the add access column allows the user to add new content a checkmark in the edit access column allows the user to edit existing content a checkmark in the delete access column allows the user to delete existing content reports secure work from home reports are accessed using ocm for those roles which should provide report access, grant report access to the role on a per report basis a checkmark in the access column allows the report to be run and viewed a checkmark in the export access column allows the report results to be exported a checkmark in the detail access column allows viewing of detailed report results where appropriate for more information on secure work from home reports, please see reporting docid\ pdbg fb1vhhxjthsyiei8