Using the system management options.

Using the system management options.


6.1            Group structure

[Group structure] The module is used to manage the group structure and enterprise user information management in the enterprise. The hierarchical relationship is created and managed by admin or enterprise administrator

6.1.1 Attribution of business data

Various business data generated by enterprise users will only be stored under the group structure group in the enterprise where they belong, and all business modules in the enterprise are grouped using the same group structure.
·  In the same enterprise organization structure, users at a high level can access business data in a low-level structure. Conversely, low-level users cannot access high-level business data, and other companies cannot access these data.
·
   In the same enterprise group structure, business data between groups is visible within the group.
·
  An enterprise administrator can  manage  all business data  in the  organization structure of the enterprise but cannot access data of other enterprises.

 

6.1.2 Group management  

Create a group: select a group click   to enter the [New Group] page. On this page, you only need to fill in the group name and save it 。

·            Modify and delete operations: (omitted)

·            Group permission description: visible in the default group





6.1.3 User management

 User creation

·         Click "Add User" to enter the [Add User] page. Select the group; fill in the username and Access word; after confirming the Access word, group administrator and role, click "Submit", as shown below:

Note: By default, it is a normal user. After selecting a normal user, you need to select a role; if you select an administrator, you do not need to select a role to have all the permissions under this group.




·         Modify, query, delete operations: (omitted)

·         User Accessword modification: Note that only administrators (admin or company administrators) can reset Accesswords for users in the group. Reset the Accessword to 123456.



6.2           Role management

 

[Role management] It is used to create and manage roles. Roles are used to control various business function modules and function operations of users in the system. It is composed of different function operation rights.

Description of roles

Each enterprise can create one or more roles with different permission scopes, which are used to perform different functions for different users in the enterprise group structure.

     Role information is independent between enterprises and cannot be accessed by each other.

Note: The role of admin is the system super administrator, which can manage all the functional modules and business data in the system. Among them, the functions of [System Settings] and [Enterprise Management] can only be managed by admin users, other users cannot see these two modules, including enterprise administrator users.


Role creation

Go to [Permission Management]-[Role Management], click the "Add Role" button to enter the [Add Role] page.




6.3              Business management

[Enterprise Management] The module can only be operated by the super administrator and is used to create and manage enterprise accounts in the system. Each corporate account has corporate administrator rights and can be used to log in to the system. After logging in to the system, the account can manage the organizational structure, users, and roles within the enterprise, and can view and manage all business data created by the enterprise users. But there is no operation authority for the [System Settings] and [Enterprise Management] functions, nor can you see the data of other enterprise users.


Super administrators can create, modify, query, and delete enterprises, as shown in the following figure:


Note: Enterprise delete operation is supported. After deleting an enterprise, all data associated with the enterprise will be deleted, and the devices under the enterprise will belong to the admin default group.


6.4        System log

[System Log] The system log list on the page contains the user's operation date, function  modules, log details, operation results, operator and other information records during the use of the system



6.5        
System setting

 

The system settings provide several functions such as "background server port", "message  service port" and "database service port configuration".

1)                Support web service port configurable: background service port can be configured

 (between 9000-9999), the default is 9000; message service port can be configured (between 7000-7999), the default is 7788; database service port can be configured (Between 3000-3999), the default value is 3306, after setting, you need to restart the background to take effect.


2)      System time




3)           Email Settings

                        After the email information of sender and recipient is configured in the email setting, the email notification can be received after the Access age record of abnormal body temperature appears in the background, and the email containing attendance record can be received periodically at a set period.

 




1)         Mailbox type

There are two types of mailboxes: "Office" and "Other Mailbox". "Other Mailbox" is selected by

default. When the email to be sent is a non-Office mailbox, please select this option and fill in the parameters.

2)         Sender email account

Enter the name of the email you want to send the message to. Note: Due to the different automatic judgment policies and mechanisms of mail service providers, various restrictions of mail service providers may be triggered if a newly registered email is used as the sender for frequent sending.

3)         Email Accessword

Enter the email Accessword of the email to be sent. Note: Different email servers may have different requirements. For example, if QQ mail needs to open the authorization code separately in the setting page of the account, then fill in the authorization code.

4)         Mailbox protocol type

Please select the protocol type according to the type supported by the sender mailbox server, which is usually listed on the help page of the email service provider.

5)         Mailbox server

Please fill in according to the server address listed in the sender's mailbox server, which is usually listed on the help page of the mail service provider.

6)         Port number

Please fill in according to the port number listed in the sender's mailbox server, which is usually listed on the help page of the mail service provider.


1)         Email sending period setting

The email period with attendance record can be sent automatically once a week or once a month.

2)         Email content setting

The abnormal temperature switch and attendance record switch are turned off by default. When the "Abnormal Temperature" switch is turned on, a reminder email will be sent every time an abnormal temperature record appears in the background.

After turning on the "Attendance Record" switch, the recipient's mailbox will receive an email containing attendance record within 2 minutes after the first submission, and then the email containing attendance record will be sent automatically once a week or once a month according to the specified time set.

·            Recipient information

If you fill in the recipient's email account, you can receive emails automatically sent from the background. You can add/remove recipients by clicking the "+" or "-" icon on the right. Multiple recipients can receive abnormal temperature emails and attendance records emails at the same time. The recipient's email addresses can be filled in a maximum of 10 and a minimum of 1.

Note: Due to the different mechanisms of mail service providers, it is possible to mark emails with repeated subject lines as spam. Therefore, this problem can be avoided by adding the sender's email account to the white list in the recipient's mailbox.



    • Related Articles

    • Using attendance management

      7.0            Attendance rules   [Attendance rules] Add, modify and delete related rules including shifts, holidays, public holidays, and device groups, etc. are set in this module.   7.1.1         Shift settings   The shift setting contains a ...
    • Using the console or central management software

      Console It provides an overview of the number of devices and online status; statistics on the face scan (total face scan, employee face scan, visitor face scan, stranger's face scan); today's Access and real-time monitoring (employees, visitors, ...
    • Setting up access management and permissions

      5.1        Access Management records   View all the identification records on the device, which can be grouped and filtered by device. The data body temperature value is greater than or equal to 37.3 degrees to display red font, less than 37.3 ...
    • Installing the kiosk software or central management software

      Please review this article to download the software https://support.kriosk.com/portal/en/kb/articles/where-can-i-find-the-setup-file-for-the-software-2-9-2020 One-click installation: Double-click the exe installation file and follow the installation ...
    • How to install the central management software

      Please download the setup file from here. File name: SMART_PASS_steup_V2.5.0.2.exe Please allow access/ provide permissions to install the software in Windows PC/ Server. Please note: this software will not work in Mac OS. Please ensure you have ...