Role Based Security
  • 30 May 2023
  • PDF

Role Based Security

  • PDF

Article summary

Within Aspire, access to certain system functionality is determined by permissions that allow access to those functions. Aspire’s security model is role-based. This means that roles are established within the system with permissions necessary for that role to perform its function. Roles can then be assigned to you to specify your permissions for accessing system functions. 

The screen below shows that this user is assigned to the Crew Leader role. 

Two examples of roles are Executive and Account Manager. If you are assigned multiple roles, you will have access to the combined settings. Once the System Manager has set up roles, you can assign those roles to users on the User tab of Aspire’s User screen. 

The Aspire Default Roles Matrix is a spreadsheet that presents the default security roles established when Aspire is initially set up and shows the permissions assigned to each role.


Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence