The roles applicable to the Key functionality are described in the following table:
Roleā¦ | Allows users to... |
---|
BusinessContinuity | Record the location of keys and the building(s) or room(s) they open, and use the booking system to capture who has which keys and when they are due for return. |
Key | View, create and update key requests. |
KeyInIssue | View currently issued keys. |
KeyReferenceData | View, create and update Key Reference Data. |
KeyRequestManager | View and progress key requests. |
The permissions applicable to the Key functionality are described in the following table:
Permissionā¦ | Allows users to... |
---|
Service Request Key Create | Create new key service requests but not edit existing ones |
Service Request Key Edit | Edit existing key service requests but not create ones. |
Key Reference Data | Configure and maintain key reference data.
It is advised that this is assigned to a system administrator or highly trained user.
|
Key | Create new key records. |
Key Request Manager | Access the Key Request Manager screen. |
Refer to Managing Roles for further information.