Gangmates
  • Getting Started
  • GENERAL USER GUIDES
    • Directory Services
      • Users
        • Quick Guide for Completing the CSV Template
          • Quick Guide: Formatting the Account Number Column as Text
        • New User Account Activation
      • User Types
      • Third Party Providers
    • Company Services
    • Security
      • Roles
      • Security Settings
    • Configurations
      • Branding
        • Logo
        • Domains
        • Add Email Address Format
          • Custom Expressions for Email Address Format
      • Company Settings
      • Bank Names and Codes Reference
      • Categories and Subcategories
    • Finance
      • Invoice
      • Payroll
        • Create Payslip
          • Understanding Payslip Calculations
        • Payroll Settings
        • Custom Contributions
      • Payment Processing
    • Performance
    • Organization Structure
  • API Documentation
    • API Overview
      • 🔌Authentication
      • ⏱️Rate Limits
    • API Reference
      • Company Management
      • Users Management
      • Payroll Management
        • Payroll Settings
      • Payment Processing
      • Domain Management
      • Wallet Top-Up
      • Invoices Management
  • Legal
    • Compliance and Regulatory Documents
      • Service Agreement
      • Service Level Agreement (SLA)
      • Privacy Policy
      • Data Processing Agreement (DPA)
      • Non-Disclosure Agreement (NDA)
      • Payroll Processing Agreement
      • Master Services Agreement (MSA)
      • Onboarding Checklist
      • Refund Policy
      • Terms and Conditions
Powered by GitBook
On this page
  • What are Access Roles?
  • When to Use Access Roles?
  • Step-by-Step Guide to Using Access Roles
  • Practical Use Cases for Access Roles
  1. GENERAL USER GUIDES
  2. Security

Roles

What are Access Roles?

Access Roles in Gangmates are used to define and manage the permissions granted to users. Roles determine what actions a user can perform within the platform, ensuring that access is aligned with their responsibilities. For example, roles can control who can manage payroll, create invoices, or view sensitive financial data.

Access Roles are crucial for maintaining security and ensuring that users only have access to the features and data necessary for their role within the organization.


When to Use Access Roles?

  1. Permission Management: Assign permissions based on specific responsibilities within the company (e.g., Admin, HR, Finance).

  2. Enhanced Security: Restrict access to sensitive data and actions to authorized users only.

  3. Organizational Clarity: Ensure users only interact with the features relevant to their job functions.


Step-by-Step Guide to Using Access Roles

Step 1: Navigate to the Security Section

  1. Click on the Security tab in the main menu.

  2. From the dropdown, select Roles.


Step 2: Create a New Role

  1. Click on the Create Role button.

  2. Enter the desired Role Name (e.g., "Admin," "HR Manager," "Finance Staff").

  3. Select the Permissions you want to assign to the role.

    • Permissions may include actions such as managing payroll, creating invoices, or accessing user details.

  4. Click on the Create Role button to finalize the role creation.


Step 3: Assign Roles to Users

  1. Navigate to the Directory page.

  2. Select the Users tab.

  3. Search for the user you wish to assign a role to.

  4. View the user details and click Edit.

  5. In the Role Assignment section, select the newly created role from the dropdown menu.

  6. Save the changes to complete the role assignment.


Key Notes on Using Access Roles

  1. Granularity: Roles should be created to match the needs of your organization. For example:

    • Admin Role: Full access to all features.

    • HR Role: Access to employee management and onboarding tools.

    • Finance Role: Access to payroll and invoicing features.

  2. Flexibility: Roles can be updated or adjusted as the needs of your organization change.

  3. Security Best Practice: Assign the least privilege necessary to perform a user’s duties. This reduces the risk of unauthorized access or errors.


Practical Use Cases for Access Roles

  1. Administrator:

    • Manages all users, roles, and permissions.

    • Access to system settings and reports.

  2. HR Manager:

    • Handles onboarding, user updates, and managing employee lifecycle details.

  3. Finance Staff:

    • Processes payroll, creates invoices, and manages payments.

  4. View-Only Roles:

    • For auditors or external reviewers who need access to data but cannot make changes.

PreviousSecurityNextSecurity Settings

Last updated 6 months ago