The admin account of REV can create user roles and assign permissions to them accordingly. 

“Roles” help in maintaining proper hierarchy within departments and “permissions” help in keeping information limited to the user, that is specific to their requirements.

REV features three different “permission” options for any user role. 

A. View- This permission allows the user to view the repositories and the images stored in the documents inside these repositories.

B. Edit- This permission allows the user to edit the indexing options, upload images in the document, and also to view and use the ‘Annotation’ options available in REV.


C. Delete- This permission allows the user the liberty to delete any image in the repository.

How to create roles and permissions in REV

 

To create a role and assign permissions to it

  1. Login with your admin account



  2. Go to ‘Manage Workspace’



  3. Select the repository and click on edit



  4. Go to Permissions



  5. Add and select the name of the role



  6. Assign permissions to the role as per your requirement. You can give a particular user role the permission to view, edit and/or delete.

  7. Once done, click on Save user role

  8. Now go to ‘Teams’



  9. Click on the dropdown arrow and select the user ID to which you want to assign the role



  10. Check the box next to the role



  11. Click on ‘Save changes for user(s)’.

  12. Once done, the user role with its permissions will be assigned to the user.

    Advantages of Using Roles and Permissions-



  • FlexibilityThe company only assigns roles to an employee as required. Any modifications to the organizational structure or permissions are quickly applied to all employees when the company modifies the corresponding role.

  • Less error-prone: Assigning permissions individually is a more complex process and is thus more error-prone than using role-based access control for assigning permissions.

  • Increased efficiency: Reducing the amount of work and error rate increases the efficiency of employees. 

  • Security: Access permissions prevent you from giving more permissions than needed to individual employees.

  • Transparency: The naming of roles is usually straightforward and thus increases transparency and comprehensibility for users.