iVendNext provides robust permission controls alongside flexible document sharing capabilities. While User Permissions define baseline access based on roles, the Sharing feature allows exceptions for specific collaboration needs. This article explains how these systems interact and best practices for maintaining security while enabling teamwork.
Define default access levels (Read/Write/Create/Delete) for doctypes
Applied automatically based on user roles (e.g., Sales, Accounting)
Managed via Role Permissions Manager
Overrides role permissions for specific documents
Grants temporary or project-based access
Managed by document owners via Shared With section
When a document is shared:
The system first checks standard role permissions
Then applies any sharing exceptions
Grants the most permissive access between the two systems
Example:
A Salesperson (no default HR access) can view payroll data if explicitly shared with them
An Accountant with "Read" permissions on invoices can be granted "Write" access for specific documents
Go to Role Permissions Manager
For each role, define:
Document types they can access
Permissions level (Read/Write/Submit, etc.)
Assign roles to users
Open the target document
Click + in "Shared With" section
Select users/roles and permissions:
Read Only for reference
Write for collaboration
Share to allow further distribution
Follow least privilege - only grant necessary access
Use role hierarchies to simplify management
Implement approval workflows for sensitive shares
Regularly review:
Permission Manager Report (system-wide access)
Document Sharing Logs (exception-based access)
Set up automated alerts for:
Sensitive documents being shared
External user access
Core team has role permissions
Temporary members added via sharing
Managers can share documents beyond standard permissions
With approval workflows for compliance
Vendor access to specific purchase orders
Client access to their project documents
By strategically combining User Permissions with Document Sharing, organizations can maintain security while enabling necessary collaboration. Regular audits and clear sharing policies ensure this powerful combination remains effective without compromising data protection.