Administrator Guide > Security and Permissions > Users |
The System User functionality is used to create and maintain the Temenos Lifecycle Management Suite users for the organization. The Users page displays all users for the organization. The default view of this page is the All Users view, which lists all users in alphabetical order by username. The following columns display in the Users page:
Column Name | Description |
Username | Displays the user name of the user. |
Name | Displays the full name (Last, First) of the user. |
Active | If checked, the user name is active in the Lifecycle Management Suite. |
Logged In | If checked, the user is currently logged into the Lifecycle Management Suite. |
Last Login | Displays when the date and time of when the user was last logged in. |
From the Users page, administrators can perform the following actions:
The following attributes are defined within the User Edit window when creating or editing a user in the Lifecycle Management Suite:
When creating or editing a user, the User Information tab displays by default.
This tab includes the following three sections:
The User Information section allows system administrators to enter basic information about the user.
![]() |
Certain fields within this section can be included within letter and email templates. |
The following fields display within the User Information section:
Field Name | Description | ||
First Name | Enter the first name of the user. This is a required field. | ||
Last Name | Enter the last name of the user. This is a required field. | ||
Username | Define a username for the user. This is used to log into the Lifecycle Management Suite, if not using Windows Authentication. This is a required field. | ||
Enter in the user’s email address. This is a required field. | |||
Description | If necessary, enter in a description for the user. | ||
User Type | Define the role of the user within the Lifecycle Management Suite from this drop-down. This correlates to the workflow history colors under System Management > Administrative Settings. The security for the user is not determined by this drop-down. | ||
Time Zone | Define the time zone for the user. This reflects the time that displays in a workflow history screen when an account is worked. | ||
Active | Select this check box to activate the user in the Lifecycle Management Suite. Leave the check box blank to deactivate a user. | ||
Logged In |
If checked, this box indicates whether the user is logged in to the Lifecycle Management Suite.
|
||
Phone | Enter in the phone number of the user. | ||
Phone Extension | Enter in the phone extension of the user. | ||
Branch | If there are multiple branches, select the branch where the user works. This is system-defined. | ||
Department | Enter the name of the user's department. | ||
Title | Enter the job title of the user. |
Within the Lifecycle Management Suite Authentication section, define the sign-in method of the new user.
By default, System is selected, which requires the user to enter in username and password to sign into the Lifecycle Management Suite. The administrator must define the password in this section.
![]() |
The value of the password is masked upon entry in the Password and Confirm Password fields.
|
Select the Windows method to allow users to sign in using the Windows Authentication icon on the sign-in page. If this option is selected, the system validates the Windows ID and password for the user during the log in process for the Lifecycle Management Suite. Enter the Windows Account for the user in the Windows Account field. The format for the windows account is always DOMAIN NAME\username.
Select the Public API method to establish a dedicated user to communicate with connectors and third party integrations using the Public API DMZ service. Upon selecting this method, complete the following parameters:
![]() |
These settings are only used for certain connectors that utilize the Public API DMZ service. |
Parameter | Description | ||||
API Key |
Enter the API Key generated by Temenos.
|
||||
Secret Key |
Enter the Secret Key generated by the financial institution.
|
![]() |
When saving this screen, the API Key is decrypted and validated against the installation key for the environment to confirm that the key is valid. If the API Key does not match, an error message displays to the user. |
Within the Host Authentication section, define the Host ID, Host ID 2, and Host Password for the host system.
![]() |
These settings are only used for certain host systems. For more information, please see the applicable core connector guide for the institution. |
The Company Information tab is comprised of two sections: Company Information and Organization Structure.
The Company Information section of the tab provides the ability to define the following information for the user:
![]() |
The fields within the Company Information section are for informational purposes only. |
Field Name | Description |
Company Name | Enter the name of the company. |
Company Website | Enter the website URL for the company. |
Company Email | Enter the email address for the company. |
Company Phone 1 | Enter in the primary phone number for the company. |
Company Phone 2 | Enter an additional phone number in which the company can be reached. |
Company Fax | Enter in a fax number for the company. |
Company Address 1 | Enter the first line of the company address. |
Company Address 2 | Enter in the second line of the company address. |
Company City | Enter the city in which the company is located. |
Company State | Enter the state in which the company is located. |
Company Zip Code | Enter the zip code in which the company is located. |
Branch Number | Enter the branch number of the company. |
Within the Organization Structure section, select a value from the desired Organization Level field(s) to define how the user is to be grouped for easier reporting purposes. The values in each drop-down populate from the ORG_LEVEL1, ORG_LEVEL2, or ORG_LEVEL3 lookup fields in System Management > Field Configurations.
The Personal Information tab provides system administrators with the ability to define the user’s personal information.
![]() |
The fields within the Personal Information section are for informational purposes only. |
The following fields display in this tab:
Field Name | Description |
Address 1 | Enter the first line of the user’s home address. |
Address 2 | Enter the second line of the user’s home address. |
City | Enter the city in which the user resides. |
State | Enter the state in which the user resides. |
Zip Code | Enter the Zip Code in which the user resides. |
Home Phone | Enter the home phone number of the user. |
Other Phone | Enter an additional phone number of the user. |
Home Email | Enter in the personal email address of the user. |
The Collections Settings tab provides the ability to set collection standards for the user. These fields are used by administrators to track collection performance.
The following fields display within this tab:
Field Name | Description | How contributes to User Performance | ||
Daily Work Hours | Identifies the number of hours per a day that the user is expected to work. | N/A | ||
Total Calls per Hour | Identifies the number of calls that a collector is expected to make per hour. |
Used to determine:
|
||
Target % Contacts | Identifies the percentage of calls placed by the user expected to result in a successful, valid contact. |
Used to determine:
|
||
Target % Promises | Define the percentage of successful promises the user must meet. |
Used to determine:
|
||
Target % Promises Kept | Define the percentage of successful promises kept the user must meet. |
Used to determine:
|
||
Max Promise Days | Identifies the maximum number of days a collector can define for the time period in which the total promise must be fulfilled. For example, if the max promise days is set to 30 days and the user sets the promise to be completed in 45 days, the promise goes to management for approval. |
N/A | ||
Max First Payment Days | Identifies the maximum number of days in advance that a collector can schedule the first promise payment. For example, if the max first payment days is set to 10 days and the user schedules the first payment in 20 days, the promise goes to management for approval. |
N/A | ||
Max promise payments |
Identifies the maximum number of payments in which a user is able to divide a promise payment.
For example, if the max promise days in System Management > Modules > Collection is equal to 4, and the user sets up 5 payments, the promise is deferred to management approval. |
N/A | ||
Max % Promise Tolerance |
Identifies the maximum percentage of the total promise amount that a user can accept to satisfy the promise payment. A promise payment can be short without being considered broken as long as the payment meets the discount requirement specified here.
|
N/A | ||
Min Promise Value As % of DQ Amount |
Identifies the minimum % of the total promise amount that the user is allowed to accept. |
N/A |
![]() |
For additional information on User Performance, please see the User Performance Web Part topic in the User Guide. |
Within the Security Groups tab, assign the user to a Security Group. The Security Groups available to assign are defined in System Management > Groups > Security Groups.
![]() |
A user can be assigned to multiple security groups. |
The Permissions tab enables system administrators to manage a user’s access to several features throughout the Lifecycle Management Suite.
This tab contains two columns: Function and Permission. Click under the Permission column in the corresponding row, and a drop-down appears. Change the value in this drop-down to modify the user's access to the functionality. The following permission options are available for each user:
Below is a list of all the permissions that can be customized by the administrator and their description.
Collections | |||||||
Name of Permission | Description | ||||||
Edit Expenses:
Allows a user to add and edit expenses within the Expenses - Account screen in the workspace.
|
None = Users cannot add or edit expenses within the Expenses - Account screen. When the screen opens in the workspace, the toolbar is not available, and the screen displays as read-only.
Change = Allows users to add and edit expenses within the Expenses - Account screen. |
||||||
Edit Letters:
Allows a user to edit the letters assigned to a Send Letter Workflow step. |
None = Users are unable to edit letters in the Send Letter workflow step. When View/Print is clicked in the workflow step, the letter opens in a PDF document, which does not permit changes.
Change = Allows users to modify letters in the Send Letter workflow step. When View/Print is clicked in the workflow step, the letter opens in an editable Word document. |
||||||
Edit Promise Payments:
Allows a user edit existing promise payments made within the person workspace. |
None = Users cannot edit promise payment arrangements, or cancel promises in the Promises screen. Change = Allows users to edit promise payment arrangements, and cancel existing promises in the Promises screen. |
||||||
Edit Promise Status:
Allows a user to edit the promise status of an existing promise made in the person workspace. |
None = Users cannot edit promise statuses in the Promises screen.
Change = Allows users to edit promise statuses in the Promises screen.
|
||||||
End Exclusive Rule Authoring Session:
Allows a user to end an exclusive Rule Authoring session in System Management > Collections > Rules Management. |
None = User is not able to end the exclusive rule authoring session of another user in Rules Management. The End Session button is disabled within the Rule Sessions tab.
Change = User is able to end the exclusive rule authoring session of another user in Rules Management. The End Session button is enabled within the Rule Sessions tab. |
||||||
Event Processing:
Allows a user to create and maintain event and action pairings. |
None = Event Processing screen within System Management is not available to user.
View = Event Processing screen within System Management can be viewed but not edited by user. Change = Event Processing screen within System Management screen can be viewed and edited by user. |
||||||
Recovery Approval:
Allows a user to view and process pending charge offs within System Management.
|
None = Users do not have access to the Recovery Approval page in System Management and are not able to respond to charge-offs pending approval.
View = Users have access to the Recovery Approval page in System Management but are not able to accept and/or reject charge-offs. Change = Users are able to both access the Recovery Approval page in System Management and process pending charge-offs. |
||||||
Rules Management:
Allows a user to access the Rules Management application. The Rules Management application allows users with proper permissions to view and create rules to apply in various contexts throughout the system. |
None = Users do not have access to the Rule Management page in System Management > Collections, and do not have the ability to view/open the rules manager in various other areas in the system that utilize the rules integration. Change = Allows users access to the Rules Management application throughout the system. |
||||||
View Masked Fields:
Allows a user to view the value of masked fields in the workspace.
|
None = User is unable to view the value of masked fields in the workspace. When the user hovers over the
View = User is able to view the value of masked fields in the workspace. Clicking the
|
||||||
Workspace:
Allows a user to perform various functions within the person workspace, such as writing comments or working a queue, as well as grants the user permission to use the Search feature within the Ribbon Bar. |
None = Users are not able to perform various functions within the workspace, such as posting a comment, or working a queue, and can not access workspaces from the Queues, Views, and/or Dashboards page. When set to None, the user is also unable to use the Search feature; therefore, the
View = Allows users to view comments and queues in the workspace, but not work queues. When set to View, users are able to access workspaces from the Queues, Views, and/or Dashboards page, and use the Search feature; however, only screens and workflows that the user is assigned permission to are available in the Left Navigation Panel, and no changes can be made to any screens and/or workflows in the workspace. Change = Allows users to perform various functions in the workspace, such as posting a comment, and working queues. When set to Change, users can access workspaces using the Search feature, as well as from the Queues, Views, and/or Dashboards page, and are able to perform all functions for the selected account or person in the workspace.
|
Recovery | |
Name of Permission | Description |
Activate Repayment Plan:
Allows the user to activate a repayment plan for a recovery account. |
None = Activate Repayment Plan button is not enabled for the user on a Repayment Plan screen.
Change = Activate Repayment Plan button is enabled for the user on a Repayment Plan screen. |
Cancel Repayment Plan:
Allows the user to cancel a repayment plan for a recovery account. |
None = Cancel Repayment Plan button is not enabled for the user on a Repayment Plan screen.
Change = Cancel Repayment Plan button is enabled for the user on a Repayment Plan screen. |
Create Repayment Plan:
Allows the user to create a repayment plan for a recovery account. |
None = Create Repayment Plan button is not available in the workspace ribbon.
Change = Create Repayment Plan button is available in the workspace ribbon. |
Finalize Recovery Account / Repayment Plan:
Allows the user to complete recovery accounts and repayment plans for a recovery account. |
None = Finalize Repayment Plan button is not enabled for the user on a Repayment Plan screen. Finalize Recovery Account button is not enabled for the user on an Account screen.
Change = Finalize Repayment Plan button is enabled for the user on a Repayment Plan screen. Finalize Recovery Account button is enabled for the user on an Account screen. |
Modify Active Repayment Plan Payments:
Controls the availability for the Recalculate button within the Repayment Plan Scheduled Payments panel and allows the user to modify an active repayment plan.
|
None = Recalculate button is not enabled for the user on the Repayment Plan Scheduled Payments panel.
Change = Recalculate button is enabled for the user on the Repayment Plan Scheduled Payments panel. |
Modify Charge Off Properties:
Allows the user to modify information for an account that was recommended and approved for charge-off. |
None = User cannot execute the Charge-Off Account workflow step.
Change = User can execute the Charge-Off Account workflow step. |
Recalculate Accounting Rule Interest:
Allows the user to recalculate interest real-time on a recovery account or repayment plan through the Recalculate Interest button added to a recovery account or repayment plan Interest Rates panel. |
None = Recalculate Interest button is not enabled for the user on an Interest Rates panel.
Change = Recalculate Interest button is enabled for the user on an Interest Rates panel. |
Modules | |
Name of Permission | Description |
RECOVERY:
Allows a user to view and change settings within the Recovery page in System Management. Any changes made within the Recovery page apply to all of Recovery in the Lifecycle Management Suite.
|
None = Users can not view or access recovery settings in System Management > Modules > Recovery.
View = Allows users to view recovery settings, but not make any changes to the settings in System Management > Modules > Recovery. Change = Allows users to view and make changes to recovery settings in System Management > Modules > Recovery. |
System Management | |
Name of Permission | Description |
Data Purging Allows a user to view and change the data purge settings for Lifecycle Management Suite database tables. |
None = Users can not view or access the Data Purging page in System Management > Data Purging.
View = Allows users to view, but not make any changes to the Data Purging page in System Management > Data Purging. Change = Allows users to view and make changes within the Data Purging page in System Management > Data Purging. |
Field List Configurations:
Allows a user to map values from the BANKRUPTCY_PARTY_TYPE and PARTY_TYPE lookups to up to 10 flattened Bankruptcy Party or Legal Party fields, in order to populate the data in letters, views, and/or reports.
|
None = Users cannot view or access the Field List Configurations page in System Management..
View = Allows users to view the Field List Configurations page in System Management, but not make any changes. Change = Allows users to view and make changes within the Field List Configurations page in System Management. |
GL Accounts (Recovery Module):
Allows a user to view and change GL Accounts when using the Recovery Module. GL Accounts are used when defining the posting rules on a transaction code to determine how a new transaction is allocated on a recovery account. |
None = Users can not view or access the GL Accounts page in System Management.
View = Allows users to view but not make any changes to the GL Accounts page in System Management. Change = Allows users to view and make changes within the GL Accounts page in System Management. |
Letter Barcode Activation:
Allows a user to activate the letter barcode process and define the location where scanned files are to be placed for the institution. |
None = Users can not view or access the Letter Barcode Activation page in System Management > Communication > Letter Barcode Activation.
View = Allows users to view, but not make any changes to the Letter Barcode Activation page in System. Change = Allows users to view and make changes within the Letter Barcode Activation page in System Management. |
Letter Barcode Scanning Exceptions:
Allows a user to view exception documents, as well as manually attach the documents to the applicable account or cases. |
None = Users can not view or access the Letter Barcode Scanning Exceptions page in System Management > Communication > Letter Barcode Scanning Exceptions.
View = Allows users to view, but not make any changes to the Letter Barcode Scanning Exceptions page in System. Change = Allows users to view and make changes within the Letter Barcode Scanning Exceptions page in System Management. |
Letters and Forms:
Allows a user to create letters and other forms to be used when working a case within the system.
|
None = Users can not view or access the Letters and Forms page in System Management > Communication > Letters and Forms.
View = Allows users to view but not make any changes to the Letters and Forms page in System Management > Communication > Letters and Forms. Change = Allows users to view and make changes within the Letters and Forms page in System Management > Communication > Letters and Forms. |
Transaction Codes (Recovery Module):
Allows a user to track payments, adjustments, and expenses on charged off accounts. Multiple transaction codes can be configured to apply funds differently to an account. |
None = Users can not view or access the Transaction Codes page in System Management.
View = Allows users to view but not make any changes to the Transaction Codes page in System Management. Change = Allows users to view and make changes within the Transaction Codes page in System Management. |
System Management - Recovery | |
Name of Permission | Description |
Batch Transaction Import
Allows a user to process a Batch Transaction Import |
None = System Management screen not available to user.
View = System Management screen can be viewed but not edited by user. Change = System Management screen can be viewed and edited by user. |
Batch Transaction Import Review:
Allows a user to review transactions and allow or prevent them from processing. |
None = System Management screen not available to user.
View = System Management screen can be viewed but not edited by user. Change = System Management screen can be viewed and edited by user. |
Debt Cancellation:
Allows a user to view, export and mark recovery accounts as reported to the IRS. |
None = System Management screen not available to user.
View = System Management screen can be viewed but not edited by user. Change = System Management screen can be viewed and edited by user. |
Recovery Approval:
Allows a user to view accounts recommended for charge-off and either charge-off the account or reject the recommendation. |
None = System Management screen not available to user.
View = System Management screen can be viewed but not edited by user. Change = System Management screen can be viewed and edited by user. |
Within the Screens tab, assign available screens to the user. If a screen is assigned, the user has access to the screen in the personworkspace.
![]() |
The screens and boxes that display on the User Edit screen are determined by the enabled module(s). For example, if origination is not active, origination screens are not available to be assigned, and the Available and Assigned Origination Screens boxes do not display on the Screens tab. If the institution uses the Account Servicing modules, as well as the Origination modules, boxes display to assign both Collection screens and Origination screens to the user. |
![]() |
If the security group the user is assigned to has access to the screen, by default the user has access to the screen even if they do not at the user level. |
In the Workflows tab, workflows can be assigned to “None,” “View,” or “View & Execute.”
If a workflow is assigned to None, the user is not able to view the workflow history associated to the workflow nor execute the workflow. If assigned to View, the user can view the workflow history associated to the workflow but cannot execute it. If assigned to View & Execute, the user can view the workflow history and execute the workflow on an account, case, or person.
![]() |
If the security group the user is assigned to has access to the workflow, the user has access to the workflow by default, even if he or she does not have access at the user level. |
In order for a user to have access to a workflow on an Area, the following criteria must be met:
For each Workflow, security can be set on the Area and the User or Security Group level. This security only applies when a user enters the Workspace of an Area. For example, if a workflow is not assigned to an Area, the workflow does not appear in the Area regardless of the security applied to the workflow.
When assigning a workflow to an Area or assigning Users and Security Groups to a workflow, there are three levels of security:
![]() |
None is the lowest level of security, and View & Execute is the highest level of security. |
In the Dashboards tab, assign available dashboards to the user. If assigned the user is able to open the dashboard from the dashboard icon in the Lifecycle Management Suite ribbon.
![]() |
If the security group the user is assigned to has access to the dashboard, by default the user has access to the dashboard even if they do not at the user level. |
In the Views tab, assign available views to the user. If assigned, the user is able to open the view from the views icon in the Lifecycle Management Suite ribbon.
![]() |
If the security group the user is assigned to has access to the view, by default the user has access to the view even if they do not at the user level. |
In the Reports tab, assign available reports to the user. If assigned, the user has the ability to view/run the reports from the reports icon in the Lifecycle Management Suite ribbon.
![]() |
If the security group the user is assigned to has access to a report, the user has access to the report by default, even if he or she does not have access at the user level. |
In the Areas tab, assign available areas for the Account Servicing modules to the user. These assigned areas are available to the user in the Areas drop-down in the person workspace.
![]() |
If the security group the user is assigned to has access to the area, the user has access to the area by default, even if he or she does not have access at the user level. |
In the Categories tab, assign available categories to the user.
User Credentials enable administrators to assign the user specific IDs required for certain functionality throughout the Lifecycle Management Suite.
![]() |
Credentials may be used as a prerequisite when activating certain third party connectors within the Lifecycle Management Suite. For more information on whether credentials are required for a connector, refer to the applicable Connector Guide. |
Administrators can add and remove credentials for a user by means of the Credentials toolbar. Once a credential is added, the below attributes may be assigned in the grid displayed:
![]() |
If desired, the Connector Credentials Import Process can be manually run on demand from the server where the Lifecycle Management Suite is installed to import user level connector credentials from an Excel file, and automatically populate the credentials within the Credentials tab for each user in the file. Reference the Connector Credentials Import section below for more information on this functionality: The Connector Credentials Import process provides the ability to easily import third party credentials for all users with access to a connector's functionality, rather than separately adding credentials for each user within the Credentials tab. A system administrator or IT Support representative for the institution can manually run this process on demand from the server where the Lifecycle Management Suite is installed. The following section provides an overview of the steps to take to import connector credentials for each active user in the Lifecycle Management Suite:
Step One: Create and Export Report of Active UsersPrior to running the Connector Credentials Import process, system administrators can create a report from the Reports page in the Ribbon Bar that identifies the username for each active user in the Lifecycle Management Suite. The following fields can be added to the report within the Fields tab of the Report Configuration window to generate a list of the usernames:
Once created, the report can be run, and then exported to Excel.
After the Excel file is created, system administrators can save the file locally, and use it as a base to create the import file for the Connector Credentials Import process. Step Two: Create the Import File for the Credentials Import ProcessThe Excel file of active users from the Lifecycle Management Suite can be used as a base to create the file for the Connector Credentials Import process. System administrators can export an Excel file with credentials from the applicable third party, and then add the credentials to the Excel file created with the user information from the Lifecycle Management Suite. Each file must include the following three columns of information, and a row for each active user having credentials imported for the connector:
Step Three: Run the Connector Credentials Import ProcessAfter the Import file has been created and saved for the connector, the LMS.Core.CredentialsImport exe file process can be manually run from the institution's server. To run this process:
Step Four: Review Log FileWhen the Connector Credentials Import process is run, a Log File is automatically created on the Share Path to provide an overview of the Import results for each Credential Type. The Log file for the Connector Credentials Import can be accessed by navigating to the share folder on the server where the Lifecycle Management Suite is installed, selecting the Log folder, and then opening the Connector Credentials Import file. This file contains a section for each credential type imported during the Connector Credentials Import process, including the date and time the import was run, as well as the following information about the results of the Import:
If a failure occurs, a separate "Failed" entry appears in the file for each record that failed to import for the credential type. This entry lists the number of the record that could not be imported, the LMS username associated with the failed record, the connector username associated with the failed record, and an error message that identifies the reason for the failure. Reference the table below for an overview of the error messages that may appear for a failed record in the Log File for the Connector Credentials Import:
|
Field | Description | ||||
Type |
Select the type of user credential being added for the user. Credentials may be system-defined, or specific to a connector. The following credentials are system-defined:
|
||||
ID | Enter the ID, or username, assigned to the user for the third party connector. | ||||
Password |
If a password is required, enter the user's password for the third party connector.
|
||||
Confirm Password | If a password is required, re-enter the password defined in the Password field. |
Restriction Codes are used to identify accounts containing personal information for individuals employed by or related to a financial institution.
This section allows system administrators to restrict users from accessing specific accounts within the Lifecycle Management Suite. System administrators can assign codes to a user, which grant the user access to accounts that are restricted. Additionally, system administrators can prevent users from accessing a person's account by adding the person's identifier to the Restricted Persons grid.
![]() |
In order to view an account, the user must be granted permission based on both the Restriction Code and Restricted Persons. |
Account Restriction allows access to restricted accounts to be controlled on an account by account basis. Permissions are set on each user to give access to restricted accounts.
To enable Account Restriction in the Lifecycle Management Suite, select the "Enable Account and Person Restrictions" check box on the Security Tab in System Management > Administrative Settings.
The restriction level on an account is determined by the Account Restriction Code field in the Lifecycle Management Suite. If Account Restriction Processing is enabled in the Lifecycle Management Suite, then a user must be given the appropriate permissions in order to view restricted accounts.
By default, all users have access to accounts with a 0 or no Account Restriction Code. To grant a user access to restricted accounts, enable access within the Restricted Account section by entering a value in each applicable Restriction Code field. The possible value for the Restricted Access field on each account are 0-6. The numeric values represent the following types of restricted accounts:
(0) Normal
(1) Restricted
(2) Sensitive
(3) Employee
(4) Employee Family
(5) Employee Sensitive
(6) Employee Sensitive Family
In order for a user to view an account with a Restricted Access level of 1 or higher, the user must have an Account Restriction Access of an equal or greater value. For example, if an account has a Restricted Access level of 3, then a user must have a 3, 4, 5, or 6 entered in the "Restriction Code 1" field in order to view the account.
System administrators can restrict persons from a user, which prevents that user from gaining access to the person’s account workspace. When a person is restricted, all of the person's related accounts and cases are also restricted. If the user tries to access a restricted person through a search, or when working a queue, a message appears stating that the person/account requires special permission to view.
![]() |
The system uses the following logic to populate accounts for restricted and non-restricted persons in the workspace:
|
To add a person restriction for a user:
In the Notification Groups tab, assign available notification groups to the user. If assigned, the user has the ability to receive notifications when a comment is added to an application via email or from the Notifications icon in the ribbon bar.
![]() |
This tab is available for all users, but is only used to assign Assignment Groups for use in the Origination modules. |
In the Assignment Groups tab, assign the user to the applicable Assignment Groups.
Field | Description | ||||
Max Number of Applications Assigned |
Enter the maximum number of applications that can be assigned to the user.
|
Assign available assignment groups to the user. If assigned, the user is able to have applications automatically assigned.
![]() |
For more information on Assignment groups, please see the Assignment Groups topic in this guide. |
The Scheduling tab enables administrators to identify a user’s scheduled time off, so that applications are not assigned to the user during a time that he or she is not available to work applications.
![]() |
This tab is available for all users, but is only used to set a schedule for users who work in the Origination modules. |
The Scheduling tab includes a calendar that displays the days and times that the user is not available to work applications.
At the top of the calendar, administrators are able to click to go back to the previous month, and click
to advance to the next month.
To establish a user's schedule, hover over the desired day, and click Add to open the Calendar pop-up window.
Within the Calendar window, use the Date/Time controls to set the user's schedule.
![]() |
Administrators are able to select a date range to set the schedule for multiple days at once. |
Once a schedule is set, the Start/End Time displays in the calendar within Scheduling tab.
Lending Settings enables administrators to assign Application Sources and Restricted Account Types to each user working in the Origination module.
This tab includes the following multi-grids that allow system administrators to determine which application sources and restricted account types a user is able to process applications for in the application workspace:
Grid | Description |
Available Application Sources | Contains a list of the values configured for the APPLICATION_SOURCE lookup in System Management > Origination > Field Configurations. Assign application sources to the user by dragging and dropping the desired item(s) from the Available grid to the Assigned grid, or by using the arrow keys. |
Assigned Application Sources | Contains a list of all application sources that have been assigned to the user. |
Grid | Description |
Available Restricted Account Type | Contains a list of the values configured for the RESTRICTION_CODE lookup in System Management > Origination > Field Configurations. Assign restricted account types to the user by dragging and dropping the desired item(s) from the Available grid to the Assigned grid, or by using the arrow keys. |
Assigned Restricted Account Type | Contains a list of all restricted account types that have been assigned to the user. |
To create a user:
To copy an existing user:
To edit an existing user:
When a user is deactivated, the Active check box on the General tab is disabled.
To unlock a user that has been deactivated, perform the following actions:
To delete a user: