Each access type for a user controls the following aspects of system behavior:
You can associate an access type with a contact by selecting the access type while creating or updating the contact record.
The following table lists the predefined access types, identifies their linked roles, and gives a brief description.
Access Type |
Linked Roles |
Description |
---|---|---|
Administration |
|
Provides the highest level of security access to all key administration roles. Used during implementation and ongoing administration. Note: The Administration access type is preconfigured to allow administrators to switch to any of the linked roles. For example, to see a different view of the system, administrators can switch to the Employee role without having to log out and log in again. |
Customer |
|
Provides highly restricted access to external customers who use the self-service view. |
Employee |
|
Provides highly restricted access to internal employees who use the self-service view. Used to create new incident and update incident pages. |
IT Staff |
|
Provides analyst-oriented access to users who work within your IT organization but are not actual members of the support team. This access is designed specifically for users who need access to Knowledge Management. |
Knowledge Management |
|
Provides administrative access tailored to users who administer Knowledge Management features. |
Process Management |
|
Provides access tailored to users who perform key process management roles. |
Service Desk Management |
|
Provides access tailored to users who manage IT support or external customer support functions (typically front-line support supervisors). |
Service Desk Staff |
|
Provides access tailored to users who perform support tasks. Access is focused on those users that perform frontline support. |
Support Automation Admin |
|
Provides access to users that perform Support Automation administration. |
Support Automation Analyst |
|
Provides access to users that provide live assistance to end users. |
Vendor Staff |
|
Provides highly restricted access to external vendors, who work only on items directly related to their product (for example, a particular brand of hardware). |
Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |