Administration Overview
t impact how the software operates across departments and teams.
This includes setting up user roles and permissions, customising workflows, managing helpdesk configurations, and defining parameters for resource management and asset tracking. Properly configuring these settings ensures that SAM functions efficiently, supports collaboration, and optimises productivity. By tailoring SAM’s system parameters to align with the organisation’s processes, administrators can streamline operations and ensure that users have the tools and access they need to perform their tasks effectively.
- Company Settings: Configuring your company settings is a crucial step in setting up the platform to meet the unique needs of your organisation.
- Service-Level Agreements (SLAs): Defining the Prefix codes that is used by the agreements module when creating a service level agreement for your customers.
- User Roles: Assign specific roles to users, defining their access levels and permissions within the system. This ensures that users have the appropriate access to perform their tasks while maintaining system security.
- Parts: Define and setup details for your stock warehouses locations (depots), setup the units of measure and the accounts nominal codes for sales and purchases.
- Helpdesk Tasks: Configure various helpdesk-related tasks, ensuring that support staff have the necessary tools and workflows to efficiently manage and resolve issues.
- Asset Management: Set parameters for tracking and managing organisational assets, ensuring accurate records and efficient maintenance schedules.
- Enterprise-Related Settings: Adjust various settings that affect the broader enterprise operations, ensuring that all modules work harmoniously within the organisation’s structure.
Access to these modules and settings is controlled based on the permissions granted by the administrator to each user. The administrator can tailor access rights, ensuring that users can only access the modules and perform tasks that are relevant to their roles. This role-based access control helps maintain the integrity and security of the system while allowing users to perform their duties effectively.