4 Software Roles with Different Access Layers

With the implementation of more and more key control systems and the continuous in-depth exploration of market demand, we gradually introduce forward-looking and more market-valuable functions into the management software to ensure that LANDWELL remains at the forefront of the key management field. Today we are pleased to introduce you to this important characteristic of […]

With the implementation of more and more key control systems and the continuous in-depth exploration of market demand, we gradually introduce forward-looking and more market-valuable functions into the management software to ensure that LANDWELL remains at the forefront of the key management field. Today we are pleased to introduce you to this important characteristic of software roles. This feature is designed to prevent unauthorized access and simplify key and asset management for organizations of all sizes, providing a flexible and efficient solution for multiple managers within the organization.

A vertical tree organization structure is always easy to understand, with higher departments able to gain insight into the dynamics of their sub-departments and maintain constant accountability. A department can be your customer, your organization, your group or even a specific employee.
In LANDWELL Key management systems, a “department” is created by the administrator of the parent department and represents a unique entity that contains users, key cabinets and keys, permission groups, reports, and virtually all other administrative resources. The system requires that users can only access equipment that belongs to the same department as they do.

Software Roles

Prior to implementing a key management system, the organization should define permissions for each role to the extent possible. This includes, but is not limited to, defining permissions in the following:

  • Access to specific keys
  • Registering system resources
  • Key authorization management
  • Querying key reports
  • Switching network modes

1. Common User

The common users are those who use keys, either by applying for them or by being authorized by an administrator to gain access to them, and then log in to the system with their face, fingerprints, passcards, passwords, or a combination thereof, to access specific keys.

2. Administrator

Administrators are created by the department’s system administrator, take on almost all administrative responsibilities other than creating an administrator, and are allowed access to any of the keys.

3. System Administrator

The system administrator is created by the system administrator of the parent department, is unique within the department, assumes all administrative responsibilities, and can access any key.

4. Permission Group – Custom Software Role

The system allows for the addition of a customized Permission Group role where members of the group will have the same key access, the same menu access and the same shift schedule.
1) Administrator logs into the system
2) Go to Permission Group Settings and select Add
3) Enter the name of the role
4) Select the menus, keys and schedules they have access to
5) Just save it
How to set a user as a customized role
1)User settings
2) Add or edit a user
3) Role type, select your preset permission group
4)Save it

Share:

More Posts

What is RFID

What is RFID? RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio

Why do you need key management

Why do you need key management

Key management can be an important part of an organization’s operations, especially when dealing with large numbers of keys. Here are some ways key management