Effective Peer-To-Peer Permissions are vital for maintaining the security and integrity of shared resources within a network. By following the principles and best practices outlined in this documentation, you can establish a robust access control system that ensures users can access the appropriate resources while safeguarding against unauthorized access and data breaches.
Peer-to-peer Permissions are a crucial aspect of access control within a system. They determine what one user can access from another user's resources, whether it's forms, data, or any other shared content. These permissions are defined to ensure the security, privacy, and integrity of the data and resources within a Peer-To-Peer Access. This documentation aims to clarify the permissions required to access specific resources and outlines the principles and best practices for effective access control.
Permission Types
Permission | Details |
---|---|
General | If the user will access to send Emails within Peer to Peer they will need at least access to Account Emails for them to be able to see the list of available Senders and/or Reply to. |
Page | Depending on the level of access you want to give a user plus the type of Peer to Peer you are building you can apply multiple permissions for the user from Managing Pages, Components (this is needed if they will access images & files and other areas associated to components), Bage Types (this is crucial if adding donation forms, registration confirmation forms and other form types associated to the Peer to Peer). |
If the user will access to send Emails within Peer to Peer they will need at access on this permission to use the Email Tools within Peer to Peer | |
Data Management | This is applicable to users that will need to handle, view or export different data associated to the Peer to Peer Site Transactions and other data within. |
Reports | Similar to Data Management, this is applicable to users handling the ability to view or export different data out. |
Peer to Peer | Currently the access is an all or nothing to access the Peer to Peer Module |
Depending on what type of User Type will be accessing the Peer to Peer Module, permissions needed could vary. Learn more about managing the different User Types.