📚
Aerofiler Administrator Guides
  • Introduction
    • Getting Started Guide for Aerofiler Admins
  • Approvals
    • Negotiations
    • Rules
      • Editing Rules
    • Workflow Setup
      • Automatic Approval
      • Contract Workflow Settings
        • Workflow Details
        • Approval Workflow
        • Document Template
        • Direct Template Editing
        • Creating Rules
        • CC Notifications
        • Post-Signing Notification
      • Contract Fields
        • Additional Fields
      • Default Values
      • Contract Approval Sequence
      • Permissions
        • File Replacement
  • General
    • API Keys
      • Example - Creating a Workflow in Aerofiler
      • Zapier Authentication
    • Configuration
      • General Settings
      • Authentication Settings
      • Repository
      • Approvals
      • Calendar Configuration
      • IP Address Filtering
    • Organization Details
    • Permission Schemes
      • Access to Own Documents
      • Create Workflow Permissions
      • Enable Document Delete
      • Permission Schemes
      • Restriction Rules
      • Restricting Upload Permissions
    • Reminders
      • Editing
    • Teams
    • Users
      • Two-Factor Authentication Settings
      • Manage Organization Users
      • Deactivated Users
      • Add Organization Users
      • Bulk Adding Users
      • Transferring Data Between Users
        • Transfer Reminders with Rules
  • Repository
    • Fields
      • Default Values
        • Example - Assign Based on Custom Field
      • Field Groups
        • Expand by Default
      • File Fields
      • List Fields
      • Notes
      • Parent / Child Fields
      • Tags
        • Currencies
        • E-Sign CC
        • Text Fields
      • URL Fields
    • Integrations
      • Adobe Sign
        • Carbon Copy
        • Custom Filename
        • Direct Access
        • Recipient Names
        • Signing Tags
        • Troubleshooting
      • DocuSign
        • Certification of Completion
        • Changes After Sending
        • Custom Filtering
        • HMAC Security
        • Including / Excluding Users
        • Send from Repository
        • Settings
        • Visibility
      • External Workflows
        • Direct Integration
        • Zapier Integration
    • Metadata
      • Smart Naming
      • Metadata Detection
      • Use Folder Names for Metadata
      • Use Filenames for Metadata
    • Importing Data
  • Single Sign-On
    • ADFS via SAML
    • Azure AD via OIDC
    • Azure AD via SAML
    • OKTA via OIDC
    • OKTA via SAML
  • Supplier
    • Configuration
    • Reminders (Supplier Portal)
Powered by GitBook
On this page
  • Role
  • Document Permissions
  • Deactivation
  1. General
  2. Users

Manage Organization Users

PreviousTwo-Factor Authentication SettingsNextDeactivated Users

Last updated 2 years ago

Role

By default, Aerofiler allows you to set the following user roles:

  • Admin - these users have access to all functions with the system, including deleting documents and setting permissions

  • Edit - these users have the ability to edit document metadata, for example setting counterparty, start date, contract term and relationships between documents

  • Read - these users have the ability to view, but not edit, document metadata

  • Limited User - users have no access to documents by default. Permissions need to be added using file-level or Document Type permissions

To change a user's role, click on the "Role" icon:

Then select the applicabel option from the dropdown:

Document Permissions

Default role permissions can be overridden by Document Type permissions. Consider the following image for a user with a Read role:

To allow the user to have Edit access to documents of type NDA, you would change the Document Type permission as follows:

Deactivation

Aerofiler provides a deactivation function. To deactivate a user, clicking on the following icon:

and confirm the prompt. Deactivated users will:

  • not be able to sign in

  • have all reminders deleted

  • be removed from all teams

It is also possible to define a custom role using .

Permission Schemes