Assigning the correct permissions to users in Meritto ensures they have access to the necessary modules and actions while maintaining system security. This article guides you through the process of assigning and managing permissions for users.
To assign permissions to a user, you must have the Manage Permission access enabled. Follow these steps to verify your access:
Log in to your Meritto account.
Expand the Menu and navigate to User Access Control > Manage Permission.
The Manage Permission Listing Page will display existing permission templates.
You can create, edit, or delete permission templates based on your access level.
If you do not see this option, contact your Customer Success Manager for access.
To create a new permission template:
Click on the Create button in the top-right corner.
An overlay will appear, prompting you to enter the following details:
Permission Template Name – A unique identifier for the template (mandatory).
Select Permissions – Choose one of the following options:
Clone an existing template – Copies permissions from an existing template.
Create from scratch – Manually select permissions.
Click Create to proceed.
Once the template is created, you will see two tabs:
Note: Changes must be saved module-wise before navigating away.
Navigate to the Assigned Users tab within a permission template.
Click on the Add Users option to select users who should have this permission.
Once selected, they will be assigned the respective permissions.
Locate the user under the Assigned Users tab.
Click on the Change Permission action button next to the user's name.
A pop-up will appear with a dropdown list of available permission templates.
Select the new permission template and confirm the changes.
Bulk updates can also be performed by selecting multiple users.
Assigning permissions in Meritto helps maintain a secure and well-organized system by ensuring users have the necessary access without compromising sensitive data. With permission templates, administrators can efficiently manage user roles, streamline access control, and make updates with ease. Following these steps enables better control over system security and operational efficiency.