User access management
Last updated
Last updated
You can add & configure different users with 6 types of roles based on your business requirements. Please find below the roles & their respective descriptions below.
ROLES | DESCRIPTIONS |
E-Invoice User | This role provides the user access to all actions for both sales & purchase documents within e-invoicing i.e Upload, Generate, View, Cancel, Request for rejection, Download, Print, Email |
Sales E-Invoice User | This role provides the user access to all actions for only sales documents within e-invoicing i.e Upload, Generate, View, Cancel, Download, Print, Email |
Purchase E-Invoice User | This role provides the user access to all actions for only purchase documents within e-invoicing i.e Upload , Generate, View, Cancel, Self-billing, Request for rejection, Download, Print, Email |
View Only User | This role provides access to only view & download both sales & purchase documents. With this role, the user won't be able to take any action or upload any new data in e-Invoicing. |
Sales View Only User | This role provides access to only view & download only sales documents. With this role, the user won't be able to take any action or upload any new data in e-Invoicing. |
Purchase View Only User | This role provides access to only view & download only purchase documents. With this role, the user won't be able to take any action or upload any new data in e-Invoicing.
|
Navigate to the “User access” page via “Settings” option on the left-hand panel
Click on the button “Invite new user” to start adding a new user to your workspace.
Enter user details for adding a new user
Type of user
Name
Product – Select “EInvoice”
Role – Select the role for which you want to give the user the access.
Click on “Continue” after entering the details as expected.
Once you have invited the user, they will receive an email to accept the invitation on the email address that was mentioned before.
The intended recipient can accept the invitation and start using the workspace based on the role access they have configured.