A Simple Scenario for Security

This is an example of a small agency with centralized users. To set up workflow phase access you need to consider when and what access will be given to a position.

Agency structure outline:

Step 1 – Determine Workflow

 

Workflow

Create project

Generate estimate

Set up funding

Create proposal

Advertise, Addenda

Letting

Award/reject proposal

Passed to Construction

Step 2 – Determine Types of Users

 

User Groups

Estimators

Central Office

Letting Staff

Step 3 – Determine User Control within Workflow

 

 

Workflow

Estimators

Central Office

Letting Staff

A

Create project

Created in Estimator

Not applicable

Not applicable

B

Generate estimate

Done with Estimator

Not applicable

Not applicable

C

Set up funding

Not applicable

Load project from Estimator, add funding

Not applicable

D

Create proposal

Not applicable

Add proposals and associate projects

Not applicable

E

Advertise, create addenda

Not applicable

Make changes because of addenda

Set up lettings, associate proposals, enter purchases

F

Letting

Not applicable

View bids

Load bids

G

Award or reject proposal

Not applicable

Assist with review

Bid review, award or reject, pass to construction

H

Passed to construction

Not applicable

May look at previous proposals

Not applicable

 

Step 4 – Determine phases and type of access

Workflow review:

Resultant workflow/phases:

 

 

Workflow/Phases

C & D

Preparation

E

Advertisement

F & G

Letting

H

Construction

Access review:

Resultant workflow/phase access rights:

 

Workflow/phases

Central Office

Letting Staff

Preparation

Update

No

Advertisement

Update

Update

Letting

Read

Update

Construction

Read

No

Related topics:

Introduction to User Security

 

Blue bar indicating the end of the topic