Skip to content

Project Roles

Overview

The project roles area within the CAG Database empowers administrators to manage individual user accounts and define their access permissions. This crucial functionality allows administrators to oversee and control who has access to specific features and data within the database. By managing user roles, administrators can ensure that each user has the appropriate level of access tailored to their role and responsibilities. Updating roles enables fine-grained control over what actions users can perform, enhancing security and maintaining data integrity. This administrative capability not only facilitates efficient user management but also supports compliance with organisational policies and regulatory requirements. Effective management of users and permissions is essential for maintaining a secure and organised environment within the CAG Database.

Understanding Project Roles

Project Roles are fundamental aspects of managing access and security within the CAG Database. Users refer to individuals who have accounts and interact with the database, each with specific roles and responsibilities within the organisation. Roles, on the other hand, dictate what actions users have permission to perform and which data they can access or modify.

Project Roles can be created by the owner of the organisation or anyone given permission.

Adding or Updating a Project Role

  1. Navigate to the System settings page.
  2. Choose Project Roles from the list.
  3. Press the Create role button, which will open the Add Role pop-up.
  4. Add the name for the new role, or update the name if you are editing a role.
  5. Select by checking or unchecking role options as appropriate. If a role option is checked, that means this role and anyone within the system who holds that role will have permissions to take that action.
  6. Press the Save button.

Key Components:

  1. User Management: Administrators oversee user accounts, including creation, modification, and deactivation. Each user account is associated with a unique identifier, login credentials, and profile details.

  2. Role-Based Access Control (RBAC): Roles categorise users based on their responsibilities, defining permissions collectively rather than individually. Roles simplify permissions management by grouping users who require similar levels of access.

  3. Permission Assignment: Administrators assign permissions to roles or directly to individual users. These permissions encompass actions such as viewing, editing, deleting, or sharing data.

  4. Security and Compliance: Implementing robust user and permission management practices enhances data security and ensures compliance with regulatory requirements. Regular audits and reviews help maintain data integrity and mitigate risks.