• Access Control

Permission Groups

Permission Groups enable you to define the record types (companies, vacancies, candidates etc.), Eploy system features and functionalities that groups of users can work with. Permission Groups also enable you to control the types of activities users can perform, such as Create, Read (view only), Update and/or Delete data.
 

  • Access Control

Field Access Groups

By creating Field Access Groups, you can define the Fields within your Candidate, Company, Contact & Vacancy records that a member of a Field Access group can work with. For example, in the Candidate record, you may wish to give some users access to all of the fields while other users may not access sensitive personal information - such as Bank details. Similarly, in the Vacancy record, you may for example, have some users who you don’t want to view the vacancy’s salary details.
 

  • Access Control

Data Access

Eploy's Data Access layer enables you to define, at a high level, what data a user can access. Primarily, this is useful for multi-company environments where group companies share a single Eploy system. In this example, you can create Data Access layers to define whether users (or groups of users) in Department A can also access records in associated Company B. Data Access layers are highly configurable, so you can add filters to restrict access further. For example, Department A users may be able to access Department B vacancies - but only those vacancies within a specific location etc.   

  • Access Control

User Roles

With the ability to define user permissions, field and data access to such a granular degree, we are also introducing Roles to make managing this increased flexibility much easier.  You can create as many Roles as your business requires, and for each role, you can set their Permission Groups, Field Access Groups and Data Access Layers.  By adding a user to a role, they will inherit the data, field, and permissions associated with the role, making it easy to update permissions and access levels - with all changes instantly rolled out to the correct users.
 

  • Access Control

Multi-Factor Authentication

For enhanced security Eploy supports Multi-Factor Authentication (MFA) by email, SMS or app (including Microsoft Authenticator), which can be further locked down using IP ranges. Customers can also access further settings to define required password complexity, expiry, reuse, re-attempt timelock, and CAPTCHA.