Context based Permissions

Context based permissions enable granular access control. For e.g., A usergroup may be allowed to view or edit data only of a particular project or department.

Before assigning a context-based permission, a context must first be created. To learn more about "Contexts" and the process of creating them, refer to the "Contexts" section.

The ViewZen Platform comes with pre-defined contexts. For e.g., geographical contexts such as countries, states, districts etc. These contexts are available for all organizations and need not be created again.

Context based Permissions

Context-based permissions can be assigned at either the user or user group level. When assigned to a user group, the permission applies to all users within that group.

User Level - Users -> Click the User -> Go to Permissions -> Context based Permssions -> Click "+ Add Permssions"

User Group Level - Users -> Click the User Group -> Go to Overview-> Click "Permissions" -> Select Context based Permssions -> Click "+ Add Permssions"

1

Add Permissions

Clicking on "+ Add Permissions" will open a panel on the right side where you can enter the permission details such as permission name and rules

Permission Name - Each permission can be assigned a name to help identify and understand its purpose.

Add Permissions
2

Add Rules

A permission can consist of one or more rules. Click on "+ Add Rule" to add a new rule to the permission.

When more than one rules are added to a permission, the Rules are evaluated using AND conditions, meaning all specified rules must be met for the permission to apply.

A rule can contain multiple conditions, either (a) all of which must be satisfied for the rule to apply or (b) at least one must satisfy for the rule to apply.

This allows for the creation of complex permissions, which can be assigned at either the user or user group level.

Rules
3

Allowed or Denied Permissions

Permissions may be Allowed (users are granted access to resources that meet the specified conditions) or Denied (users are restricted from accessing resources that meet the specified conditions).

Last updated