Access Control Logic
System Security Framework
Advanced permission logic and security implementation
Dynamic tab visibility control
Multi-layered security features
Comprehensive auditing system
The access control logic determines how permissions are evaluated and enforced throughout the Enerlites Portal. This system ensures secure, role-based access to features and data while maintaining comprehensive audit trails.
Management Tab Visibility
The management tabs are dynamically filtered based on user permissions:
Tab Visibility Logic
Team Management:
hasManagementAccessAttendance Tracker:
hasManagementAccess OR canEditCreateUsersPTO Tracker:
hasManagementAccess OR canEditCreateUsers OR canAccessPTOTrackerInsurance Tracker:
canAccessInsuranceTrackerTraining Tracker:
hasManagementAccessNavigation Redirection
Automatic User Routing
- No Management Access: Users are redirected based on their highest permission level
- Insurance Only: Redirected to Insurance tab
- PTO Only: Redirected to PTO tab
- Attendance Only: Redirected to Attendance tab
- No Permissions: Redirected to Dashboard
Feature-Level Access Control
Form Submissions
- All Users: Can submit most forms (time off, tools, etc.)
- Manager Approval: Forms routed to appropriate managers
- Special Approvers: Certain forms (unpaid leave) route to specific approvers
- Validation: Permissions checked before form submission
Data Visibility
- Department Filtering: Users typically see data for their department
- Management Override: Management permissions override department restrictions
- Privacy Protection: Sensitive data restricted to authorized users
- Dynamic Filtering: Real-time permission-based data filtering
Import/Export Functions
- CSV Import: Requires
canEditCreateUserspermission - Data Export: Available to users with relevant management permissions
- Bulk Operations: Restricted to administrative users
- Audit Trail: All import/export operations logged
Security Features
Permission Inheritance
- Hierarchical Structure: Higher permissions include lower-level access
- Role Stacking: Users can have multiple complementary permissions
- Override Protection: System prevents unauthorized permission elevation
- Inheritance Validation: Automatic validation of permission hierarchies
Access Logging
- Permission Changes: All permission modifications are logged
- Administrative Actions: Management activities are tracked
- User Access: Login and feature access is monitored
- Data Modifications: Changes to sensitive data are recorded
Session Management
- Permission Validation: Permissions checked on each request
- Session Expiration: Automatic logout for security
- Permission Refresh: Real-time permission updates
- Invalid Access Prevention: Unauthorized access attempts blocked
Data Protection
- Role-based Filtering: Data filtered based on user permissions
- Sensitive Information: Protected data requires specific permissions
- Department Isolation: Department-specific data protection
- Export Controls: Data export restricted by permission level
Permission Management
Assigning Permissions
- 1. Access Team Management: Requires
hasManagementAccess - 2. Select User: Choose user to modify
- 3. Manage Permissions: Click permissions action
- 4. Select Permissions: Check/uncheck permission boxes
- 5. Save Changes: Apply new permission set
Troubleshooting
Access Denied Issues
- 1. Verify user's assigned permissions
- 2. Log out and back in to refresh session
- 3. Ensure no conflicting permission settings
- 4. Contact IT if persistent problems
Feature Not Visible
- 1. Check permission requirements for feature
- 2. Clear browser cache and cookies
- 3. Allow time for permission updates to propagate
- 4. Confirm user role matches intended access level
Compliance and Auditing
Permission Auditing
- Regular Reviews: Quarterly permission audits recommended
- Access Reports: Generate reports on user permissions
- Change Tracking: Monitor permission changes over time
- Compliance Checking: Ensure permissions align with job roles
Documentation Requirements
- Permission Matrix: Maintain documentation of role-permission mappings
- Change Log: Record all permission modifications
- Access Justification: Document business reasons for permission grants
- Review Schedule: Establish regular permission review cycles
Regulatory Compliance
- Data Access Controls: Ensure compliance with data protection regulations
- Separation of Duties: Maintain appropriate role separation
- Audit Trails: Comprehensive logging for compliance purposes
- Access Certification: Regular certification of user access rights
