Role-based security feature

role-based security Kohezion


Here is another great feature you will use with our online database software. It is called role-based security. This feature will allow you to give specific permissions to users or user groups based on the projects they are concerned with.


How to access the role-based security feature

Under the tab «Administration», click on «Security». You now have four choices:

1.  Users

2.  User groups

3.  Project permissions: this is where you will manage role-based security for your projects.

4.  Account

When you click on «Project Permissions», you see a list of all your projects. To customize the accesses of a specific project, double-click on its name.


User or user group permissions

You now see two almost identical sections. The first section is about the users’ permissions and the second is about the user groups’ permissions. For users or user groups, the procedure is the same. Select the user or user group you want to customize in the left column and choose one or many out of the six permission choices you have on the right column.


Types of permissions available

The permissions you can give are:

1.  Create item: Give permission to create a new item.

2.  Delete item: Give permission to delete an item.

3.  Edit item: Give permission to edit an item.

4.  Invisible user: An invisible user won’t appear in user lists. This means you can’t assign him a task or email comments. This is a feature you will add on top of others. This user can be very active in the project but without being involved on the daily stuff. CEOs love this feature!

5.  Project administrator: The project administrator is permitted anything and everything. This is the ultimate permission. You will usually have only one or two of those users per project.

6.  View items: This is usually used for users participating from an observer’s point of view. They can see what is going on but can’t participate.


With this feature, it is incredibly easy to manage who can do what. Customization possibilities are endless.