Products
Solutions
Resources
9977 N 90th Street, Suite 250 Scottsdale, AZ 85258 | 1-800-637-7496
© 2024 InEight, Inc. All Rights Reserved | Privacy Statement | Terms of Service | Cookie Policy | Do not sell/share my information
Welcome to InEight Document.
This video demonstrates how to use mail types to manage access and restrict correspondence between users or companies.
When setting up security groups, access to every single available mail type can be defined as none, read, review or send.
This means that every type of user can be given the appropriate level of access based on the security group they are in regardless of their role or company.
For example, mail types can be used in this way to ensure certain sensitive mail types are only sent or received from the appropriate contacts on a project.
Another way mail types can be used is to restrict correspondence between certain companies.
Such as between a subcontractor and stakeholder government agency.
In this case, as long as neither company has access to the same mail types, they will not be able to use InEight Document to communicate with each other.
To do this, first, grant access to this new mail type click here, select admin, then manage user access.
Select to the security group for the government agency.
In this case, since the government agency only need access to this new mail type.
Tick here, and save.
Confirm that only the appropriate users are in this security group by selecting users from up here.
Next, I'll go into the subcontractor security group and ensure they have no access to this mail type.
Confirmed.
Lastly, since the government's stakeholder only needs to communicate with the main contractor, I'll grant access to this mail type to the relevant users who are all in the main contractor security group.
Again, I'll check everyone in this security group should have access to this mail type. If anyone should not be in this group, they can easily be moved to a different security group.
In this case, all the required users are in these two security groups And since this is a new mail type, I can be confident no other security groups have access to it.
Don't forget though, for any new security groups created in future, remember to remove access to this restricted mail type as appropriate.
Well, that's how to control access using mail types. Thanks for watching.
Additional Information
9977 N 90th Street, Suite 250 Scottsdale, AZ 85258 | 1-800-637-7496
© 2024 InEight, Inc. All Rights Reserved | Privacy Statement | Terms of Service | Cookie Policy | Do not sell/share my information