- Access Control
Permission Groups
Permission Groups enable you to define the record types (companies, vacancies, candidates etc.), Eploy system features and functionalities that groups of users can work with. Permission Groups also enable you to control the types of activities users can perform, such as Create, Read (view only), Update and/or Delete data.
- Access Control
Field Access Groups
By creating Field Access Groups, you can define the Fields within your Candidate, Company, Contact & Vacancy records that a member of a Field Access group can work with. For example, in the Candidate record, you may wish to give some users access to all of the fields while other users may not access sensitive personal information - such as Bank details. Similarly, in the Vacancy record, you may for example, have some users who you don’t want to view the vacancy’s salary details.
- Access Control
Data Access
Eploy's Data Access layer enables you to define, at a high level, what data a user can access. Primarily, this is useful for multi-company environments where group companies share a single Eploy system. In this example, you can create Data Access layers to define whether users (or groups of users) in Department A can also access records in associated Company B. Data Access layers are highly configurable, so you can add filters to restrict access further. For example, Department A users may be able to access Department B vacancies - but only those vacancies within a specific location etc.
- Access Control
User Roles
With the ability to define user permissions, field and data access to such a granular degree, we are also introducing Roles to make managing this increased flexibility much easier. You can create as many Roles as your business requires, and for each role, you can set their Permission Groups, Field Access Groups and Data Access Layers. By adding a user to a role, they will inherit the data, field, and permissions associated with the role, making it easy to update permissions and access levels - with all changes instantly rolled out to the correct users.
- Access Control
Multi-Factor Authentication
For enhanced security Eploy supports Multi-Factor Authentication (MFA) by email, SMS or app (including Microsoft Authenticator), which can be further locked down using IP ranges. Customers can also access further settings to define required password complexity, expiry, reuse, re-attempt timelock, and CAPTCHA.