There are 3 types of security you can apply to a user field to control access.
Security Type | Description |
---|---|
View | User can view the user field on the form, but the field is read only. |
Edit | User can enter information in the user field. |
Admin | User can add and remove options in the field from within the form (Only applies to Select, Cascading, Radio and Check Box fields). |
1. Select the User field.
2. Click the Security Tab.
3. Using the Contact picker add users, companies or roles in the relevant security type.
4. Click Update.
Use the keyword AUTHOR in security
We added support for using AUTHOR as a keyword in security in these areas.
See/Edit/Administer a user field
Status Allocation
Status Action button visibility
May edit title/May edit due date
Closers and Status Changers
Status Approvers (For Approval)
May reopen a closed document
Split
Handover report
You may also use -[Author] as a security setting for exclusions. i.e. everyone but the Author can do the edit.
For security checking, iTWO cx will process rules in an order of most specific to least specific, and minus with a higher priority than plus rules.
Meaning you could configure a scenario such as +RIB-*, -RIB-JD, which would mean everyone in RIB except John Doe.
This means regardless of the order a user enters in the UI, iTWO cx will process security in the following order:
-[Author]
+[Author]
-User
+User
-User Role (Group without Allow Multiple)
+User Role (Group without Allow Multiple)
-Company
+Company
-Group
+Group
-Role
+Role
-Distribution List
+Distribution List
-All
+All