Admins
Admins have full control over the system and its operations. They possess the highest level of authority and can create, edit, and delete all types of records, including users, work orders, workflows, templates, requests, parts, meters, part types, areas, locations, assets, categories, vendors, and teams. This comprehensive access allows them to manage every aspect of the system, ensuring data accuracy, compliance, and smooth system functioning. Additionally, admins have the exclusive ability to approve or decline all requests, making them responsible for governing workflows and maintaining quality control.
Full Users
Full Users have extensive but limited permissions compared to admins. They can create work orders independently and have control over the work orders they personally create, with rights to edit or delete those specific work orders. However, Full Users cannot modify work orders created by others. Regarding requests, they have the ability to approve or decline only those requests that have been specifically assigned to them. This role is suited for team members who actively manage tasks and approvals but do not require full administrative control over the entire system.
Limited Users
Limited Users have restricted access primarily designed for technicians or roles that require visibility but minimal control. They can only view work orders, assets, and locations assigned to them and cannot create, edit, or approve any records or requests. This limitation helps maintain data integrity by preventing unauthorized changes while still allowing essential personnel to monitor tasks and updates relevant to their responsibilities.
Requestors
Requestors are users who can only create new requests and assign them to Full Users. They have no permissions to edit existing records or approve any work orders or requests. This role is typically given to observers or stakeholders who need to report issues or submit new tasks but do not participate in the execution or management of work orders. It streamlines the request submission process while delegating approval and action to authorized personnel.
These distinct user roles ensure that system access is tailored to organizational responsibilities, protecting critical data and maintaining efficient workflow management.