- 02 Aug 2023
- 1 Minuto para leer
- Impresión
- PDF
Other System Administration Tasks
- Actualizado en 02 Aug 2023
- 1 Minuto para leer
- Impresión
- PDF
Security Setup
General Aspire Access explains how to set up security in Aspire and defines the permissions available for assignment to roles.
Browser Selection and Setup
Section Mobile Time App Setup on Mobile Device provides information about browser selection and setting up a mobile device.
Deactivating Users
The system manager can deactivate user accounts if for any reason an individual should no longer have access to the system. This is accomplished by locating the user from the User Management section of the Administration menu. After navigating to the User Management section, click on User, click on the user in the Users Search List and toggle the Active switch off and click Save. clicking the user in the Users Search List, deselecting the Active checkbox, and clicking the Save icon. After taking this step, the user will no longer be able to log into Aspire unless their account is reactivated.
Approving Devices
When a new device (computer, tablet, or smartphone) is used to access the Aspire system for the first time, Aspire requires an authorized person within the organization to approve the device. Device approval requires System Admin or Branch Admin permission.
Later, the device may be unapproved if the user determines it should no longer be used to access the system. When a new device attempts to connect to the Aspire system, Aspire sends a notification to the authorized approvers from which they can directly approve access, as shown here. Alternatively, the approver may approve devices from the Devices Search List or Device screens.