Skip to main content
Version: Current

Manage System Roles

Overview

System roles are a set of permissions defined for each function.
You can also define the scope of access.
The user's authority is determined by setting a system role for the user.

The explanation of system role definition is explained below. .

User authority can also be set independently for each project.

The actual authority is determined by "system-wide authority" and "project-wide authority".

Common procedure

When defining a system role, first perform the following operations as a common premise.

  1. Click the login name in the global navigation of TimeTracker NX.

  2. Select "System Settings".

  3. Click "User" in the local navigation.

  4. Select "System Role" from the menu on the left.

System Role Operations

Add

Add the system role to be set for the user.

  • A system role defines the permission settings for each function such as "Create Project" and "Dashboard".
  • By changing the user's system role, you can achieve the following.
    • Grant the user common permissions for all projects.
    • By subdividing system roles, you can centrally manage security according to organizational rules.

Operation Procedure

  1. Click the "+" icon at the top of the system role list.

  2. Enter the system role information in the "Create System Role" dialog.

    The input items are as follows.

    No.ItemDescription
    1NameName of the system role
    2DescriptionDescription of the system role
  3. Click the "OK" button.

Change

You can change the information of the registered system role later.
You can change the permissions of users all at once by changing the permissions defined in the system role.
The changed permissions will be reflected when the target user refreshes the screen.

Operation procedure

  1. Select the target system role.

  2. Click the "Properties" icon in the local navigation.

  3. Click the "Edit" button.

  4. Set the system role's permissions and access scope.

  5. Click the "Save" button.

Delete

You can delete system roles that are no longer necessary.
Users who were granted the deleted system role will lose all permissions and will be unable to log in.

Operation Procedure

  1. Select the system role to be deleted.

  2. Click the "-" icon at the top of the system role list.

Restore

You can restore a deleted system role.
Use this if you accidentally deleted a system role or want to reuse a deleted system role.

Operation procedure

  1. Select "Deleted" in "Filter".
  2. Select the system role you want to target. Multiple selections are also possible.
  3. Click "Action" at the top of the list of system roles.
  4. Select "Restore".

Permissions to be set for system roles

List of settings

The contents of the permissions defined for system roles are introduced below.

For specific setting values, please refer to the following link: Define access range
FunctionItemContent of permission
SystemLoginCan log in to TimeTracker NX.
System AdministrationCan use Admin.
ProjectCreate projectCan create new projects.
Manage projectCan view and edit project settings.
Edit ProjectCan edit work items.
View ProjectCan view work items.
UserChange Account SettingsLogged-in users can edit their own user information.
Edit TimesheetCan edit timesheets.
View TimesheetCan view timesheets.
My PageWork Item ListCan display My Page.
AnalysisDashboardCan display the dashboard.
Cross-ProjectCan display the cross-project screen.
Pivot AnalysisCan display the pivot analysis screen.
Resource LoadCan display the resource load screen.
Export ResultsCan perform export results.
CostView CostCan view and edit costs.
TimeTracker DesktopUse TimeTracker Analytics (※)Allows use of the function.
(Applies to versions after Version 1.0.1.30830)

※ For details, please refer to "About using TimeTracker Analytics".

Functions that cannot be set in Standard Edition

The following functions cannot be used.
 ①Work item list, pivot analysis, resource load, using TimeTracker Analytics

About "using TimeTracker Analytics"

TimeTracker Analytics allows you to freely analyze the forecast and actual results of projects and users and visualize them in graphs.
However, there are some points to note, which are introduced at the following link.
Notes on Analytics

Therefore, you can control whether or not the function is available to users you do not want to use by unchecking this item as follows.

  • Check this for the system role of department manager who wants to visualize multiple projects at once.
  • Do not check this for the system role of the person in charge who should not be able to see other projects.

Access range definition

The items to be set in the access range are introduced by category.
Note that categories for which there is no authority to set the access range are omitted.

  • Project
  • User
  • Analysis

Project

No.ItemDescription
1AllCan access data for all projects and users.
2Projects below the organizationCan access projects of the organization to which the logged-in user belongs.
(Includes the access range of "Member's Project". )
3Member's ProjectCan access data for projects to which the logged-in user belongs.
4Administrator's ProjectCan access data for the administrator's project.
5Settings for individual projectsInitially, users cannot access projects.
By granting permissions to users in "Project Security",
they will be able to access the target projects.
For details, please refer to the following link: Project Security

User

No.ItemDescription
1AllCan access data for all projects and users.
2Users under organizationCan access data for users who belong to the same organization as the logged-in user.
3SelfCan access only the logged-in user's data.

Analysis

No.ItemDescription
1AllCan access data for all projects and users.
2Data under organizationCan access data for the organization to which the logged-in user belongs.
*Includes the access scope of "member's projects".
3member's projectsLogin users can access data of projects they belong to.
4administrator's projectsLogin users can access data of administrator's projects.
5selfOnly log-in user's data can be accessed.