The Security Manager in Pulse Patient Relationship Management System is used to create a means of managing the permission levels for all the users that will be working with the system. These users are assigned to Roles, to which permissions have been defined. This allows the administrators of your practice to control which functionalities of the application are available to the different levels of users in your organization. Click anywhere to continue Copyright 2012 Pulse Systems, Inc. Page 1 of 47
NOTE: Please note that the roles and permissions will need to be set up in the system prior to performing these tasks. For more information, please view the lesson Creating User Roles and Permission in this module. Click anywhere to continue Copyright 2012 Pulse Systems, Inc. Page 2 of 47
Click on the Desktop Application for this learning experience, Clinical Dashboard for our Electronic Health Record users or PulsePro for our Practice Management users. Copyright 2012 Pulse Systems, Inc. Page 3 of 47
To begin, it is assumed that you have opened the Clinical Dashboard application and are logged in with the appropriate security and privileges to complete this task. Copyright 2012 Pulse Systems, Inc. Page 4 of 47
Click the Show/Hide panel button on the toolbar. Copyright 2012 Pulse Systems, Inc. Page 5 of 47
Click the Administration tab on the left pane menu. Copyright 2012 Pulse Systems, Inc. Page 6 of 47
Click the Security Manager item in the Administration menu. Copyright 2012 Pulse Systems, Inc. Page 7 of 47
The Security Manager Form window appears. First we will work with the User Roles and Permissions functions. Click the User/Role Permissions button. Copyright 2012 Pulse Systems, Inc. Page 8 of 47
To begin, it is assumed that you are logged in the PulsePro application with the appropriate security and permissions to complete this task. In the Navigation Pane, click the Administration Group button. Copyright 2012 Pulse Systems, Inc. Page 9 of 47
If necessary, click the Scroll button in the Navigation Pane to view additional icons. Copyright 2012 Pulse Systems, Inc. Page 10 of 47
In the Administration Group, click the Security Manager Icon. Copyright 2012 Pulse Systems, Inc. Page 11 of 47
The Security Manager Form window appears. First we will work with the User Roles and Permissions functions. Click the User/Role Permissions button. Copyright 2012 Pulse Systems, Inc. Page 12 of 47
The Security Setup Form window is displayed with the Setup Role tab selected by default. There are three tabs located at the top of the window titled: Setup Role, Setup Role Permission and Setup User s Role Permission. Copyright 2012 Pulse Systems, Inc. Page 13 of 47
Below the toolbar, you will see a list which displays the User Roles currently defined in the system accompanied by a short description of the role. Copyright 2012 Pulse Systems, Inc. Page 14 of 47
NOTE: The goal of a role is to be able to assign a group of users to a role and then assign permissions to that role to add security to the application. In the new version of Security Manager, you may now assign users to more than one role and adjust individual permissions at the user level so you may limit the number of roles Here to just your major roles in the practice. Once assigned to a role, you have the ability to edit the permissions for each individual user that has been assigned to the role. Click anywhere to continue Copyright 2012 Pulse Systems, Inc. Page 15 of 47
To customize the User s Role and Permission settings, the roles and permissions will need to be previously defined in the system. For more information, refer to the Setup user Roles and Permissions in this module. Copyright 2012 Pulse Systems, Inc. Page 16 of 47
The Setup User s Role/Permission, is used to manage the roles, permissions, and rights assigned to a user. This feature allows the Administrator to fine tune the permission profile assigned to a specific user. Click to activate the tab. Copyright 2012 Pulse Systems, Inc. Page 17 of 47
To quickly locate a specific user, you may type the User Staff ID in the User field, and then press Tab or Enter. Copyright 2012 Pulse Systems, Inc. Page 18 of 47
More commonly, you will use the lookup feature provided to access a user record. To activate the lookup window, click the search button on the User field to use the Staff/Provider Lookup Table. Copyright 2012 Pulse Systems, Inc. Page 19 of 47
Click the Find button on the toolbar to populate the list. Copyright 2012 Pulse Systems, Inc. Page 20 of 47
You may choose to lookup either a staff member or a physician by selecting the appropriate radio button located at the top of the window. Copyright 2012 Pulse Systems, Inc. Page 21 of 47
NO SCRIPT Copyright 2012 Pulse Systems, Inc. Page 22 of 47
Once an option is selected, the list updates to display the users in the requested category. To begin working with a user record, click to select the record from the list, and then click the Select button on the toolbar. Copyright 2012 Pulse Systems, Inc. Page 23 of 47
No Script Copyright 2012 Pulse Systems, Inc. Page 24 of 47
The window refreshes and displays the Roles and Permissions that have been assigned to the selected user account. In this example Paula has been assigned the Clinical Users role. Paula also covers at the Front Desk so let s add an additional role to her. To add a role to this user, click the Add Role button on the toolbar. Copyright 2012 Pulse Systems, Inc. Page 25 of 47
The Security Setup Role Lookup Form window appears populated with a list of the roles which currently exist in the system. To add a role, click to select the checkbox for each role to be added to this user s permission profile, and then click OK. Copyright 2012 Pulse Systems, Inc. Page 26 of 47
No Script Copyright 2012 Pulse Systems, Inc. Page 27 of 47
The Setup User s Role/Permission window will refresh with the new roles displayed in blue. As before, click the Save button on the toolbar to save the changes. Copyright 2012 Pulse Systems, Inc. Page 28 of 47
In the dialog box, click OK to close the window. Copyright 2012 Pulse Systems, Inc. Page 29 of 47
The window refreshes and displays all records in black. Copyright 2012 Pulse Systems, Inc. Page 30 of 47
NOTE: When multiple roles are assigned to one user and the permission rights overlap, the user will be granted the more comprehensive rights between the roles and a summary of the permissions can be viewed using the Permission Summary discussed later in this lesson. Click anywhere to continue Copyright 2012 Pulse Systems, Inc. Page 31 of 47
NOTE: In addition to assigning permissions based on roles, the application offers the ability to change the rights within an individual permission for the selected user without changing the permission attributes of the assigned role. This allows the administrator to fine tune the rights granted to an individual user based upon the requirements of their position. The user should be assigned to a role or roles before the specific permissions are customized. Rights assigned or declined within the individual permissions override the rights indicated within the role permissions. Click anywhere to continue Copyright 2012 Pulse Systems, Inc. Page 32 of 47
In our example we have assigned Paula to the Front Desk role which gives her all the rights of a normal front desk user but we don t want her to have the ability to bump appointments. To customize the rights assigned to a user, click the Add Permission button on the toolbar. Copyright 2012 Pulse Systems, Inc. Page 33 of 47
The Security Setup Permission Lookup Form window will display a list of all permissions in the system. To view the options for a specific category, click the down arrow on the Category field and select an option. Copyright 2012 Pulse Systems, Inc. Page 34 of 47
For our example, we will select Scheduling. Copyright 2012 Pulse Systems, Inc. Page 35 of 47
Permissions must be assigned to a user before they can be customized. Click to select the checkboxes for the Permissions to be assigned to a user. To select all permissions in a group, click to select the checkbox on the group header. Copyright 2012 Pulse Systems, Inc. Page 36 of 47
We need to remove the ability to bump appointments from this user s profile, so we will click to de-select the checkbox for that option. Copyright 2012 Pulse Systems, Inc. Page 37 of 47
When you have completed your selections, click the OK button. Copyright 2012 Pulse Systems, Inc. Page 38 of 47
The Setup User s Role/Permission window will refresh with the new permissions displayed in blue. Copyright 2012 Pulse Systems, Inc. Page 39 of 47
To change the rights that are assigned to a particular permission, click to select the record in the Rights column of the listing. Copyright 2012 Pulse Systems, Inc. Page 40 of 47
We need to remove the ability to bump appointments from this user s profile, so we will click to de-select the checkbox for that option. Copyright 2012 Pulse Systems, Inc. Page 41 of 47
Click the Save button to update the record. Copyright 2012 Pulse Systems, Inc. Page 42 of 47
In the dialog box, click OK to close the window. Copyright 2012 Pulse Systems, Inc. Page 43 of 47
To remove Permission from a user account, click the record in the list, then click the Remove button on the toolbar. Copyright 2012 Pulse Systems, Inc. Page 44 of 47
In the event that you might need to view a comprehensive list of the roles and permissions that have been assigned to a user, you have the ability to view the Permission Summary for a particular user. To view the summary, click the Permission Summary button on the toolbar. Copyright 2012 Pulse Systems, Inc. Page 45 of 47
The Security User Permission Summary form displays the Permission Groups assigned to the individual user in the left pane. The right pane will populate with the Permission summary all permissions and associated rights whether they have been assigned to the user individually or assigned through a role. Copyright 2012 Pulse Systems, Inc. Page 46 of 47
After all configuration changes to roles and users have been completed and saved, click the window close button on the Security Setup Form to return to the Security Manager menu. Copyright 2012 Pulse Systems, Inc. Page 47 of 47