How do I customarily promote users who achieve specific project compliance goals?
Specific projects are more sensitive than others and require steady supervision along the way.
Once you set up a compliance goals architecture for your project, your next step is to fully customize user access
at scale.
To do this, you must use a combination of user profiles
and security requirements
.
Suppose you already set up your security requirements architecture, you should make a permission plan
which allows you to determine which permissions
are given to users who are compliant with the project requirements
at different levels.
1. Set up the User Profile
To create a user profile navigate to the tab in the User Profiles
section.
- Click the
Create new user role
button in the top right. - Follow the instructions from the create user profile section.
2. Test the User Profile
You can test the user profile
by attributing the custom set of permissions
to a single user (usually the project manager ).
This step requires you to carefully simulate the actions that a project member would take so that you make sure your permission settings do not go against the user access
.
To apply a profile to a user navigate to tab in the Users
section.
- Select the user(s) you would like to apply profile to.
- Click the
Apply profile
button in the top right. - Follow the instructions from the apply profile section.
3. Apply User Profile at Scale
To apply user profile at scale navigate to tab in the Users
section.
- Bulk select the users to whom you want to apply the profile.
- Click the
Apply profile
button in the top right. - Follow the instructions from the apply profile section.
Make sure you filter the users in the tab in the Users
section based on their Team
so that you can apply the user profiles efficiently.
Example:
If the project member fulfills compliance goal A
, then we will apply user profile A
to them;
If the project member also fulfills compliance goal B
, we will apply user profile B
to them.
4. Document Permission Plan to Project Members
For a compliant practice, you should document the rules to all project members in the following ways:
- In the project description.
- In an announcement to all project members.
- In a private message per member.
We do not recommend using email
to communicate with sensitive project members. This practice may reveal project members' identities
and project activities
to other members of the institution.