Parent Topic

Authorization Role

Previous Topic

Next Topic

Book Contents

Book Index

Steps for Replicating an Authorization Role

A replicated Authorization Role creates a new role with all the attributes of the role that was copied. This role can then be modified to customize it. A replicated role can be replicated again and modified.

Complete the following steps to replicate and modify an existing role:

  1. From the Configurations section>System card select the Authorization Role screen.
  2. From the Authorization Role Search screen, enter search criteria to find the role to be replicated.
  3. Click on the folder to the left of the selected role to open the record.
  4. Click on the Replicate button in the left pane to create a new role with the same attributes as the existing role.
  5. The Code is automatically entered as "Copy of (name of replicated role)" but this can be updated.
  6. The Description defaults to the same description as the replicated role, but this can also be changed.
  7. In the Self Assignment field, indicate whether the employees with this role have access to their own record, even if they don't have access to other employees in the organization unit.
  8. Indicate whether this role is Active (Yes/No)
  9. In the Is Deny Access Overrideable field, indicate whether the inherited Data Access can override direct denied access.

In the Is Available Externally field, select whether the role can be used when a web server is defined as an external web server.

  1. Save the record.
  2. The Authorization Control button is now enabled. Select this button. The following screen is displayed. In the left pane, the Authorization Policy Hierarchy shows the different section and screen options, displayed in a tree view.
  3. Expand the tree to find the Authorization Policy Hierarchy level to be modified. The right pane displays all the options below the root level, including all the sections that are displayed on the tool bar.
  4. Open the Section or Card to be modified.
  5. On the General tab, for each level of access, select Yes or No to indicate if users should have that level of access for the general record.
  6. If there is a Field tab, click on that to configure individual fields.
  7. The check boxes indicate the level of access granted for each of the listed fields. The settings default to the levels set up on the previous screen, but any of the fields can be updated here by checking or un-checking the boxes.
  8. The Exclusion Time tab is available on some policies. This opens a screen to configure days and times that the policy is not available to users with this role. For example, TimeCall employees can be excluded from checking benefit balances during shift change times. For more information on setting up this tab see Configuration section>System card>Roles>Exclusion Time tab.
  9. Click on the Save button. The access levels are displayed on the screen.
  10. Continue down the Authorization Policy Hierarchy tree, editing access to the Sections, Cards, Screens and Fields (if applicable) that the users in this role should have.
  11. Click on the Level Assignments section button in the left pane.
  12. Enter the Authorization Level to indicate the level of access for this role (e.g. administrator, supervisor, employee, etc.)
  13. Enter the Authorization Level Category (used for supervisor Authorization Level assignments) to determine if the supervisor access should be approver, editor, or read only.

    Note: Access to this role can be granted to employees either through their home organization unit in the Configuration section>Organization Unit card>Organization Unit screen>Roles section or through the Employee section>Employee record>Roles screen.

Overriding Schedule Validation Exceptions

Depending on Roles assigned to users, they may be able to override validation messages and continue to add, edit, or approve a schedule. If users do not have the authorization to override the exception, there is no option to continue and save the transaction.

Override access is determined by:

Maximum Severity Level Override Allowed by the User's Role

Depending on the role assigned to users, they may be able to override the exception message generated when a scheduling rule is violated by adding, editing, or approving a request for a schedule.

The roles are found in the Configuration section>System card>Roles screen.

In the Maximum Severity Level field, indicate the severity level of the validation exception that can be overridden. Severity levels (in order of severity) are Critical, Warning, and Informational. All exceptions with that severity level or below can be overridden for assigned users. For example, if this value is set to Warning, this user can override validation exceptions of Warning and Informational, but cannot override exceptions with a severity level of Critical. If no value is entered in this field, the user cannot override ANY level of exception message.

Severity Level of the Exception

Severity levels for a validation rule are set up on the Configuration section>System card>Exception Value screen, in the Severity Level field. Severity levels (in order of severity) are Critical, Warning, Informational, or None.

Note: The severity level displayed in the warning message may not match the value set up on this screen. If the user is able to override the error, then the level is displayed as Warning regardless of the actual exception definition severity level. If the user is not able to override the error then the level is displayed as Critical regardless of the exception definition.