Built-in roles
JFW Built-in roles
This document provides a comprehensive overview of the built-in roles available in the system. Each role is designed to ensure secure and efficient access management, enabling users to perform their tasks without compromising system integrity. Below is a detailed breakdown of each role, its purpose, and associated permissions.
1. Super Admin
Description:
The Super Admin is the highest-level role in the system, with unrestricted access to all features and functionalities. This role is responsible for overseeing the entire system, including all brands and global configurations.
Permissions:
Brand Management: Create, edit, and delete brands.
Global Settings: Configure system-wide settings, including database and licensing.
User Management: Manage users, roles, and permissions at the system level.
Monitoring: Access and monitor all logs and events across the system.
Full Access: Unrestricted access to all features and functionalities.
2. Brand Owner
Description:
The Brand Owner role is assigned to administrators of individual brands. They have full control over their brand's resources but cannot access or modify other brands.
Permissions:
Resource Management: Manage all resources within their brand, including users, roles, permissions, logs, events, and devices.
Full Administrative Access: Complete control over their brand's settings and features.
3. User Manager
Description:
The User Manager role is designed for individuals responsible for managing users within a specific brand. This role focuses on user administration and permission assignment.
Permissions:
User Management: Add, delete, and modify user information.
Role and Permission Management: Assign roles and permissions to users within the brand.
4. Support Staff
Purpose:
The Support Staff role is tailored for customer support teams within a brand. It enables them to assist users with product or service-related issues effectively.
Permissions:
Error Logs: Access user error logs for troubleshooting.
User Information: View user details without the ability to modify them.
Support Tickets: Create and track support tickets, issues, and help desk requests.
Device Management: Access the list of devices and their statuses.
Restrictions: Cannot edit users, roles, or system configurations.
5. Billing
Purpose:
The Billing role is designed for the finance team of a brand. It allows them to manage financial transactions, subscriptions, and reporting.
Permissions:
Payment Management: View payment reports, manage payments, and process refunds.
Invoices: Handle invoices and billing-related tasks.
Subscriptions: Manage subscription plans and active services.
Restrictions: Cannot edit roles, manage users, or configure brand settings.
6. Marketing
Purpose:
The Marketing role is intended for the marketing team of a brand. It provides tools to manage campaigns, track performance, and engage with users.
Permissions:
Ad Management: Create and manage advertisements.
User Engagement: Send emails and notifications to users.
Analytics: View statistics and reports related to ad performance and campaigns.
Restrictions: Cannot access logs, manage users, or modify system settings.
7. Reader
Description:
The Reader role is for users who require read-only access to information within a brand. This role is ideal for individuals who need to view data without making changes.
Permissions:
Read-Only Access: View all information within the brand, including users, roles, permissions, logs, events, and devices.
No Modification Rights: Cannot edit, delete, or create any data.
8. Tester
Purpose:
The Tester role is designed for quality assurance (QA) teams or individuals responsible for testing system features and functionalities.
Permissions:
Test Environment Access: Access testing environments and features.
Create Test Data: Generate and manage test data.
Submit Bug Reports: Report issues or bugs encountered during testing.
Restrictions: Cannot modify production data or access sensitive system settings.
9. IT Staff
Purpose:
The IT Staff role is for the IT department, responsible for maintaining system infrastructure and resolving technical issues.
Permissions:
System Maintenance: Access system logs and perform maintenance tasks.
Troubleshooting: Resolve technical issues and monitor system health.
Device Management: Manage and monitor devices connected to the system.
Restrictions: Cannot modify user roles, permissions, or financial data.
Summary
The built-in roles in the system are designed to streamline access management and ensure that users have the appropriate level of control over their tasks. By assigning these roles thoughtfully, organizations can maintain security, improve efficiency, and ensure compliance.
For further customization or the creation of additional roles, please refer to the system documentation or contact your system administrator.
Last updated
Was this helpful?