Session 2.2 - User Roles and Permissions

Session 2.2 - User Roles and Permissions

This session gives you an overview of the User Roles and Permissions in iVendNext, introducing key concepts and system functionalities.


Info

Each unit in this chapter is designed for focused learning and should be reviewed carefully. Topics Covered in this session:

  • User Roles: Foundation for Secure Access

  • Mastering Role Based Permissions

  • User Permissions, Field-Level Security and Report Restrictions

Notes
To maintain a structured learning path, participants must complete all units within the session before advancing to the next chapter.




User Roles: Foundation for Secure Access

The article below provides an introduction to User Roles in iVendNext.


Why Roles Matter

In any ERP or e-commerce system, access control isn’t just about security—it’s about clarity, accountability, and operational efficiency. iVendNext uses a role-based access model to ensure that users only interact with the parts of the system relevant to their responsibilities. For new users, understanding how roles work is the first step toward confident navigation and secure collaboration.


This article introduces the concept of user roles in iVendNext, explains the difference between system and website users, and walks through the foundational steps of assigning roles effectively.




Types of Users

iVendNext distinguishes between two primary user types:


  • System Users: These are internal users who log into the backend of iVendNext to manage operations, accounting, inventory, and configuration. They require role-based access to specific modules.

  • Website Users: These users interact with the system through the front-end website—typically customers or vendors. They do not require backend access and are not assigned roles.


Understanding this distinction helps prevent unnecessary exposure of sensitive modules to external users and streamlines onboarding for internal staff.




The System Manager Role: Power and Responsibility

Among all roles, System Manager is the most powerful. It grants full access to all modules, settings, and configurations. While this role is essential for administrators, it should be assigned sparingly.


Key considerations:


  • Only trusted personnel should be given System Manager access.

  • Avoid assigning this role to general users or trainees.

  • Use it primarily for setup, troubleshooting, and high-level oversight.


Assigning System Manager to every user may seem convenient, but it undermines the principle of least privilege and increases the risk of accidental misconfiguration.




Assigning Roles: Direct vs. Role Profiles

There are two ways to assign roles in iVendNext:


1. Direct Role Assignment

  • Navigate to the user profile.

  • Select roles manually from the available list.

  • Best for one-off or highly customized access needs.


2. Role Profiles

  • Create a predefined set of roles under a Role Profile.

  • Assign the profile to multiple users at once.

  • Ideal for onboarding teams with similar responsibilities (e.g., Sales Executives, Accountants).


Using Role Profiles ensures consistency and reduces setup time, especially when scaling operations or onboarding multiple users.




Best Practices for Role Setup

To ensure a smooth and secure experience for new users, follow these guidelines:


  • Start with minimal access: Assign only the roles necessary for the user’s immediate tasks. You can expand access as needed.

  • Avoid overlapping roles: Redundant permissions can create confusion and increase risk.

  • Document role assignments: Maintain a record of who has access to what, especially for audit and compliance purposes.

  • Review periodically: As responsibilities evolve, revisit role assignments to ensure they remain appropriate.


User roles are the backbone of secure and efficient operations in iVendNext. By understanding the types of users, the significance of the System Manager role, and the methods of assigning roles, new users can begin their journey with clarity and confidence.




Additional Learning Resources

For deeper insights and ongoing support, participants are encouraged to explore the following:


  • 📘 iVendNext Wiki Documentation: Access the official user manual for detailed guidance on system features and workflows.
    Visit the Wiki Docs


  • 🛠️ iVendNext Help Portal: Browse categorized knowledge articles covering Accounting, Buying, Selling, Stock, and more.
    Explore the Help Portal


These resources complement your training journey and serve as valuable references throughout the certification process.




Idea
Once you've completed the article, continue to the next topic in the training module to build on your understanding.




Mastering Role-Based Permissions

The article below provides an introduction to Mastering Role-Based Permissions in iVendNext.


From Roles to Permissions

Assigning roles is just the beginning. To truly control what users can see, do, and modify within iVendNext, you need to configure Role-Based Permissions (RBP). This system allows administrators to fine-tune access at the document level—ensuring that users only interact with the data and actions relevant to their responsibilities.


This article walks through the Role Permissions Manager, explains permission levels, and provides real-world examples to help novice users confidently manage access.




What Are Role-Based Permissions?

Role-Based Permissions define what actions a user can perform on specific document types (Doctypes) based on their assigned role. These permissions are layered on top of roles and offer granular control over:


  • Viewing records

  • Creating new entries

  • Editing existing data

  • Submitting or canceling documents

  • Exporting or printing reports


This system ensures that even users with the same role can have different levels of access depending on their operational needs.




Step-by-Step: Using the Role Permissions Manager

The Role Permissions Manager is the central tool for configuring RBP. Here’s how to use it:


  1. Navigate to Role Permissions Manager from the Setup module.

  2. Select the Document Type (e.g., Sales Invoice, Leave Application).

  3. Choose the Role you want to configure.

  4. Assign Permission Levels (explained below).

  5. Save and test the configuration using a test user account.


You can also use filters to view existing permissions and identify overlaps or gaps.




Understanding Permission Levels (0–9)

Each field and action in iVendNext is assigned a Permission Level from 0 to 9. These levels help control access to sensitive fields and advanced actions.


  • Level 0: Basic access—view, create, edit, delete.

  • Level 1–3: Intermediate actions—submit, cancel, amend.

  • Level 4–6: Advanced fields—financial data, approval status.

  • Level 7–9: Highly sensitive—audit logs, system configurations.


When assigning permissions, you can specify which levels a role can access. For example, a Sales Executive might have Level 0 access to Sales Orders but be restricted from Level 4 fields like discount overrides.




Real-World Use Case: Leave Approval Workflow

Let’s say you’re configuring access for a Leave Approval workflow:


  • Employee Role: Can create and view their own Leave Applications (Level 0).

  • Manager Role: Can view, approve, or reject Leave Applications (Level 1–2).

  • HR Role: Can view all applications, modify leave balances, and generate reports (Level 0–4).


By assigning permissions this way, you ensure that each role interacts with the workflow appropriately—without overstepping boundaries.




Another Example: Sales Invoice Control

In a retail setup:


  • Cashier Role: Can create and submit Sales Invoices but cannot cancel or amend them.

  • Store Manager Role: Can cancel, amend, and view financial summaries.

  • Finance Role: Can export, print, and audit Sales Invoices.


This layered access prevents unauthorized changes while maintaining operational flexibility.




Best Practices for Permission Configuration

  • Start with default roles and customize only when necessary.

  • Use test users to validate permission setups before rollout.

  • Avoid assigning high-level permissions (7–9) unless absolutely required.

  • Document changes to permissions for audit and troubleshooting.

  • Review permissions quarterly to ensure they align with evolving responsibilities.


Role-Based Permissions empower administrators to create a secure, streamlined experience for every user. By understanding permission levels and using the Role Permissions Manager effectively, you can tailor access with precision and confidence.




Additional Learning Resources

For deeper insights and ongoing support, participants are encouraged to explore the following:


  • 📘 iVendNext Wiki Documentation: Access the official user manual for detailed guidance on system features and workflows.
    Visit the Wiki Docs


  • 🛠️ iVendNext Help Portal: Browse categorized knowledge articles covering Accounting, Buying, Selling, Stock, and more.
    Explore the Help Portal


These resources complement your training journey and serve as valuable references throughout the certification process.




Idea
Once you've completed the article, continue to the next topic in the training module to build on your understanding.




User Permissions, Field-Level Security and Report Restrictions

The article below provides an introduction to User Permissions, Field-Level Security and Report Restrictions in iVendNext.


Beyond Roles and Permissions

While roles and role-based permissions form the backbone of access control in iVendNext, they don’t cover every scenario. What if you want to restrict a user to viewing only their own territory’s data? Or prevent access to sensitive fields like profit margins or audit logs? That’s where User Permissions, Field-Level Security, and Report Restrictions come into play.


This article explores these advanced tools, helping administrators create a secure, streamlined experience tailored to each user’s operational context.




What Are User Permissions?

User Permissions allow you to restrict access to specific records within a document type. Unlike Role-Based Permissions, which control actions (view, edit, delete), User Permissions control which records a user can interact with.


Common Use Cases:

  • A Sales Executive should only see customers in their assigned territory.

  • A Branch Manager should only access transactions from their branch.

  • A Finance user should only view accounts linked to their company.


How to Configure:

  1. Navigate to User Permissions in the Setup module.

  2. Select the User, Document Type, and Restricted Record (e.g., Territory = North Zone).

  3. Save and test access using the user’s account.


You can also use the “Apply to All Doctypes” option if the restriction should cascade across related documents.




Territory, Company, and Branch Restrictions

These are among the most commonly applied User Permissions in iVendNext:


  • Territory: Limits visibility of customers, leads, and sales orders.

  • Company: Restricts financial documents like Journal Entries, Invoices, and Reports.

  • Branch: Controls access to POS transactions, inventory, and reconciliations.


By applying these filters, you ensure that users operate within their designated scope—reducing clutter and minimizing risk.




Field-Level Security: Using Perm Levels

Every field in iVendNext can be assigned a Perm Level (0–9), which determines who can view or edit it based on their role’s permission level.


Example:

  • Discount Field in Sales Invoice: Set to Perm Level 4.

  • Only roles with Level 4 access (e.g., Store Manager) can modify it.

  • Cashiers with Level 0 access can still create invoices but cannot change discounts.


This technique is especially useful for sensitive fields like:


  • Pricing overrides

  • Approval status

  • Financial summaries

  • Audit trails


To configure field-level security:


  1. Open the Customize Form tool.

  2. Locate the field and assign a Perm Level.

  3. Adjust Role Permissions accordingly.




Controlling Report and Page Access

In iVendNext, you can restrict access to specific reports and pages using the “Restrict Access” checkbox in the Report/Page configuration.


Steps:

  1. Navigate to the Report or Page.

  2. Check “Restrict Access”.

  3. Assign roles that should have visibility.


This is ideal for:


  • Financial reports (e.g., Profit & Loss, Trial Balance)

  • Managerial dashboards

  • Custom pages with sensitive data


Restricting access ensures that only authorized users can view strategic insights or operational summaries.




Export and Print Restrictions

To prevent data leakage or unauthorized sharing, iVendNext allows you to restrict Export and Print actions on reports and documents.


Configuration:

  • Navigate to Role Permissions Manager.

  • For the relevant document type, uncheck Export and/or Print for the role.


This is especially useful in compliance-heavy environments or when handling customer-sensitive data.




🧰 Troubleshooting & Best Practices

  • Use test accounts to validate restrictions before rollout.

  • Avoid overlapping permissions that may cause confusion or unintended access.

  • Document all custom restrictions for audit and support.

  • Review quarterly to align with organizational changes.


iVendNext’s access control lets administrators define user permissions with precision. They can limit data visibility by territory, protect sensitive fields, and restrict access to specific reports. 




Additional Learning Resources

For deeper insights and ongoing support, participants are encouraged to explore the following:


  • 📘 iVendNext Wiki Documentation: Access the official user manual for detailed guidance on system features and workflows.
    Visit the Wiki Docs


  • 🛠️ iVendNext Help Portal: Browse categorized knowledge articles covering Accounting, Buying, Selling, Stock, and more.
    Explore the Help Portal


These resources complement your training journey and serve as valuable references throughout the certification process.




Idea
Once you've completed the article, continue to the next topic in the training module to build on your understanding.




    • Related Articles

    • Session 2.2 - User Roles and Permissions

      This session gives you an overview of the User Roles and Permissions in iVendNext, introducing key concepts and system functionalities. Each unit in this chapter is designed for focused learning and should be reviewed carefully. Topics Covered in ...
    • Session 2.2 - User Roles and Permissions

      This session gives you an overview of the User Roles and Permissions in iVendNext, introducing key concepts and system functionalities. Each unit in this chapter is designed for focused learning and should be reviewed carefully. Topics Covered in ...
    • Session 2.1 - User Types

      This session gives you an overview of the User Types in iVendNext. Each unit in this chapter is designed for focused learning and should be reviewed carefully. Topics Covered in this session: Understanding User Types and Access Creating and ...
    • Session 2.1 - User Types

      This session gives you an overview of the User Types in iVendNext. Each unit in this chapter is designed for focused learning and should be reviewed carefully. Topics Covered in this session: Understanding User Types and Access Creating and ...
    • Session 2.1 - User Types

      This session gives you an overview of the User Types in iVendNext. Each unit in this chapter is designed for focused learning and should be reviewed carefully. Topics Covered in this session: Understanding User Types and Access Creating and ...