In organizations with thousands or even tens of thousands of employees: who can view seal information, who can use seals, who can view seal information, who can directly manage seals... The contract lock refines and splits all types of permissions, such as system maintenance, seal creation, seal usage, etc., and assigns them to different roles, so that each role has different operational permissions, such as seal administrators can manage seals, system administrators can manage organizational personnel, etc. Now: Major organizations can assign these roles to corresponding employees based on internal positions and job requirements, in order to determine the roles and operational permissions that the employee plays after logging into the contract lock system. By doing so, a management state of orderly matching of "users", "roles", and "permissions" is achieved, greatly simplifying the seal management process of major organizations and achieving secure and orderly use of seals.
1) Introduction to common role authorization in the contract lock seal control system:
① Introduction to seven basic roles and permissions:
② Role permissions used frequently by the organization:
2. Authorization is achieved by assigning roles to employees:
① Quick creation of role categories: directly create "roles" with different permission types in the background according to the management needs of the organization.
(Create role classification)
② Free addition of role members:
Contract lock can already incorporate the information of the entire organization into the system according to function and structure. Whether it is employees from the headquarters or a certain branch, they can be quickly locked, realizing the free addition of members and quick empowerment of roles.
(Quickly Add Role Members)
③ Employee Resignation Quickly Withdraw Permissions:
In order to facilitate the withdrawal of permissions, administrators can delete the employee's role permissions in the system in a timely manner based on the personnel resignation information. The operation is simple and the seal is more secure.
Application value: With role division and permission settings, organizations can not only customize the seal usage process based on personnel structure and business processes, but also ensure that every seal usage can be traced, resolving risks such as unauthorized use, misuse, and information leakage.