Permissions in the Inventory Management Module allow administrators to control user access to specific inventory functions based on their roles and responsibilities.
- Admin users have unrestricted access to all inventory modules.
- Admins can assign permissions either by role (applies to all employees with that role) or by individual employee.
1. Add a New Permission
To assign new inventory permissions:
Step 1: Access the Permissions Menu
- Navigate to Settings under the Inventory Module from the left sidebar.
- Select Permissions from the menu.
- Click on the Add button.
Step 2: Configure Permission Settings
- Select Role: Apply the permission settings to all employees in the selected role.
- Select Staff Name: Apply the permission settings to a specific employee.
- Inventory Delivery Voucher Permissions:
- Change Serial Number: If the inventory delivery voucher has not been approved, employees with this permission can modify the serial number of the exported item.
Step 3: Save the Permission
- Click the Save button to apply the settings.
2. Edit an Existing Permission
To modify an existing permission:
Step 1: Access the Permissions Menu
- Navigate to Settings under the Inventory Module from the left sidebar.
- Select Permissions from the menu.
Step 2: Edit the Permission
- Select the permission entry that needs modification.
- Click Edit.
- Make the necessary changes.
- Click Save to update the settings.
3. Delete a Permission
If a permission is no longer needed, it can be removed.
Step 1: Access the Permissions Menu
- Navigate to Settings under the Inventory Module from the left sidebar.
- Select Permissions from the menu.
Step 2: Delete the Permission
- Select the permission entry that needs to be deleted.
- Click Delete.
- Confirm the deletion in the pop-up window.
β οΈ Note: Deleting a permission removes access rights permanently. Ensure that the changes align with organizational policies before proceeding.
Final Notes
- Proper permission management ensures data security and efficient inventory control.
- Assign permissions based on roles and responsibilities to avoid unnecessary access.
- Review permissions regularly to maintain security and compliance.