Letting users enter and check requisitions

You can set up your system so that different user populations can do either or both of the following:

As with other permissions available in JICS, you give users access by granting permissions to particular roles. These privileges probably were set up when your system was installed and configured, but you may need to alter them from time to time.

Note: This procedure can only be performed by an administrator.

To let users enter and check requisitions:

  1. From the Requisition Entry portlet, click the wrench icon. The system displays the Portlet Settings and Preferences screen.

  2. Click the Permissions tab. Using the checkboxes in the Operations column, set the appropriate security level for each role, for each of the following functions: Can Check Requisitions and Can Enter Requisitions.

  3. Click Save.

Related Topics