Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Warning

THIS PAGE IS UNDER CONSTRUCTION

Overview

The primary purpose of nVIRO is to serve the needs of various user groups that utilize the services it provides. To support this objective, proper management of the users that interact with the system is of paramount importance. This help topic and its related subtopics cover the user-management functions in nVIRO.

Types of Users

Three main user groups use the nVIRO system: public users, external users, and internal users. Each of these groups has different levels of access to and visibility within the system.

  • Public users

     can

     do not have an nVIRO user account. Public users can only access certain public-facing features such as the

    Site

    nSITE Explorer

    and

    , public notice search

    . These users do not have user accounts in the system and so the user

    , or the ability to submit a complaint. User management functions described in these pages do not apply to

    them

    public users.

  • External users are those non-agency users

    who need access to the system to work with one or more permitted facilities

    (such as members of the regulated community) who have an nVIRO user account. External users can apply for permits, submit reports, and download documents related to their sites among other tasks. Typically, these users are facility owners and/or their representatives,

    permittees

    employees, consultants, etc.

  • Internal users are

    staff members of the

    regulatory agency

    for which nVIRO has been implemented

    staff. Internal users can access different parts of the system according to the security groups and workgroups of which they are members.

Info

Note that, for nVIRO installations that rely on Active Directory, the user must be added to both Active Directory and to nVIRO.

User accounts are managed under Admin > Users. For details about managing user accounts, see User Management.

User Security and Permissions

Please see the Security Groups article for more information on how user permissions are provisioned.

On this page

Table of Contents

Sub-Topics

Page Treeroot@self

Related Content