Introduction to Risk Management privileges
Use roles and privileges to determine who can perform specific tasks related to Risk Management.
Privilege type |
Description |
---|---|
Application privilege |
Permission to access Risk Management is based on assigned privileges. Default roles with access to Risk Management include:
|
Feature privileges |
When performing tasks in Risk Management, the Interactions privileges for the role assigned to the user controls the ability of the user to access features. You can grant separate privileges to:
Default roles with access to use Risk Management features include:
|
Interactions privileges |
Access to specific interactions is based on the organizations, groups, and subgroups over which you have scope (not including your own interactions). These scope-based permissions apply when searching for, replaying, and exporting interactions in Risk Management. In addition, you can configure privileges for the following:
|
Case privileges |
The Risk Management privileges assigned to user roles determine whether users can complete the following tasks:
Case visibility for specific organizations and groups is configured through the Assignment Manager. |
Recycle bin privileges |
The Risk Management privileges assigned to user roles determine whether users can create, update, and delete recycle bins. |
Folder privileges |
The Remove Contact Flags privilege controls the ability to create, update, and remove folders. Folder visibility for specific organizations and groups must also be configured through the Assignment Manager. |
Administration privileges |
Permission to perform administrative tasks related to Risk Management. For example, the assignment of roles and privileges The only default role with administration privileges is the Enterprise Manager Administrator. |
Risk Management roles and privileges
Pre-Defined Risk Management roles
Replay approval role permissions
User Management Guide
Roles and Privileges Reference