About Supervision and Access

Supervision and access can be derived using the Organization and Position Setup or the Team and Supervisor Setup. The Access Setup Configuration page is used to select the preferred method.

Organization and Position Setup

If this method is used, access is granted to the entity Employee.

Who can be accessed is determined by an organization unit. Organization units work as containers of accessible employees. This selection can be further narrowed only to certain positions.

Supervision can be granted in different ways:

Team and Supervisor Setup

If this method is used, access is granted to the entity Person.

Who can be accessed is determined by Team assignments and Additional Access assignments. Each individual assignment can have a specific access role assigned to it.

Supervisors can be added to Teams, and persons (referred to as Members of the Team) can be directly assigned to supervisors.

Other entities who have access to a person, but are not their supervisors, can be added as Additional Access entities to a person. These accessing entities can be individual persons or Role Based Access Groups. If using Additional Access, it is possible to grant access to selected employments associated to a person.

For both the above methods, Access Roles determine what can be accessed. An access role specifies what data can be viewed and what operations can be performed, e.g., authorization, approval, cancellation, deletion.

HR Application Manager Access provides access to everything and everyone in Human Capital Management. This is usually reserved for a few selected people. Access roles are not application in this context.

Technical Information:

Access control is based on Logical Units, which are pieces of programming code devoted to a specific application area, e.g., travel expenses, time authorization, benefits administration. Access management allows you to protect employee data related to the selected logical unit (e.g. travel expenses, training and development, time and attendance, schedules and rules).

Access management is divided into 3 layers built on top of each other: