8.2.3 RPAM Policies - Role Definition
RPAM policies are implemented by defining roles in the Resource Reservation system. These roles are created by combining default system permissions into groups.
This modular approach ensures each role has the precise permissions needed for its designated responsibilities. For example, some roles might focus on initiating reservation requests, while others are designed for administrative tasks like managing, approving, and scheduling reservations. This customization ensures roles are equipped to effectively carry out their functions throughout the entire reservation lifecycle.
The built-in role - [Access] - only grants permission to access an Access Profile and no other permission. This role cannot be edited or removed.
To create roles that meet your organization's needs, combine various permissions such as 'Requires Authorization,' 'Can Authorize,' or 'Can Self Book.' Once defined, roles can be assigned to multiple users or user groups, seamlessly integrating with your workflow. Roles are defined in the Permission Groups section of the Security area of the Settings menu in the Web Manager.
Below is a list of available permissions:
Immediate access
Enables immediate access to the profile.
Requires Authorization
Indicates that the user request requires an approval.
Can Authorize
Can authorize / approve reservation request
Can Self Book
Can create reservations for oneself.
Can Get Booked
Can be added by others for the use of a resource.
Can Book Others
Can create reservations for others.
Allow Recurrency
Can create recurring reservations.
Last updated
Was this helpful?