Permissions
View
viewReferralProgram
viewLedgerRecords
viewUserProfile
viewCurrency
viewUserRole
viewLiabilitiesAssests
viewBlockchain
viewMonitoring
viewUserDocument
viewUserBalance
viewOperation
viewPaymentInterface
viewWorkflow
viewTask
viewStaking
viewRole
viewAccountsAssets
viewWorkflowAudit
viewPermission
viewUser
viewDashboard
Edit / Create
editCurrency
editUserRole
editMarket
createCurrency
createMarket
reset2FA
editUserKYC
editStaking
editWorkflow
editRole
setSoftBan
editBlockchain
processOperation
editUserState
editPaymentInterface
Request
requestDeposit
requestWithdraw
Accept
securityAudit
useWorkspace
acceptWithdraw
acceptCurrency
acceptMarket
acceptReset2FA
acceprtSoftBan
acceptDeposit
Roles
Admin View - The Admin role in this system has limited permissions, focused on viewing information across all pages and details. This role enables users to access the admin panel but restricts them from initiating or approving actions. The primary function is to observe and gather insights, maintaining a comprehensive view of the system's data and activities.
Support - The Admin role with support permissions has exclusive access to requesting actions within the admin panel but lacks configuration capabilities. This user can submit requests, seeking assistance or changes, but is restricted from modifying system configurations. This focused role ensures streamlined support functionalities without compromising system integrity.
Business Analyst - The Admin role with Business Analyst permissions has broad access, viewing all pages and details. While equipped with configuration permissions, the role is limited to initiating requests rather than making direct changes. This ensures a comprehensive understanding of the system while maintaining controlled adjustments through the request-based workflow.
DevOps - The Admin role with DevOps permissions is specialized, allowing access solely to the DevOps page. This focused view empowers the user to oversee and manage specific aspects related to development and operations, streamlining their responsibilities within a targeted scope
Finance Controller - The Admin role with Finance Controller permissions enjoys comprehensive access to all pages, facilitating a thorough overview. With the authority to approve configuration requests, as well as deposit and withdrawal operations, this role plays a crucial role in financial management, ensuring control over critical actions within the system.
Super Admin - The Admin role with all available permissions is a central and powerful entity within the system. With access to all pages, this administrator can comprehensively oversee the entire platform. They possess the authority to make configurations without requiring approval, enabling swift adjustments. The ability to execute deposit and withdrawal operations without external validation streamlines financial processes. Furthermore, this Admin can manage user privileges by editing and adding other privileged users, fostering user management flexibility. The capability to edit permissions for privileged users ensures a tailored access control mechanism. Additionally, the administrator can view, edit, and create workflows, contributing to a dynamic and adaptable system. This broad spectrum of permissions grants the Admin unparalleled control, emphasizing their pivotal role in managing and shaping the platform's functionalities.
Admin Deposit
Approve_Deposit_Test_Bank_PI
Conditions for permissions:
Requester Role: requestDeposit
Approver Role: acceptDeposit
Start node
Copy node
Copy node
Action Call node
A. Success → Set Fields node
B. Error → End node
Set Fields node
User Decision node
A. ‘Accept’ out port → Action Call node
Success → End node
Error → End node
B. ‘Reject’ out port → End node
C. ‘Delete request’ node → End node
_______________________________________
Creating a workflow for an admin panel with distinct roles for requesting and approving actions involves defining a series of steps and permissions. Below is a basic outline of the workflow, along with the roles and their respective responsibilities. Keep in mind that the actual implementation may vary depending on your specific requirements and the technology stack you are using.
Roles:
Requester Role:
Can initiate actions or requests.
Submits necessary information for the requested action.
Limited permissions, primarily focused on initiating requests.
Approver Role:
Reviews and approves/rejects requested actions.
Has broader permissions to manage approvals.
Workflow:
Request Initiation:
The Requester logs into the admin panel.
Navigates to the section for initiating actions or requests.
Fills out a request form, providing all necessary details.
Submits the request.
Request Review:
The system logs the request and notifies the Approver role.
The Approver logs into the admin panel.
Navigates to the pending requests section.
Reviews the details of the request.
Approval Process:
The Approver has the option to approve or reject the request.
If approved, the system proceeds with the requested action.
If rejected, the system notifies the Requester with a reason for rejection.
Action Execution:
If the request is approved, the system executes the requested action.
This may involve database updates, changes in configurations, or other relevant operations.
Status Updates:
The system updates the status of the request to reflect whether it was approved, rejected, or is still pending.
Notification:
Both the Requester and Approver receive notifications on the status of the request.
Notifications may be in-app alerts, emails, or any other preferred communication method.
Additional Considerations:
Logging and Auditing:
Maintain detailed logs of all actions, including who initiated requests and who approved them.
This helps with accountability and auditing.
Role-Based Access Control (RBAC):
Ensure that permissions are well-defined for each role to prevent unauthorized access.
User Interface:
Design a user-friendly interface that clearly indicates the status of requests and provides necessary information for both roles.
Security:
Implement proper security measures to protect sensitive data and actions.
Scalability:
Design the system to scale as the number of requests and users increase.
Customization:
Allow for customization of approval workflows based on specific business needs.
Customize this basic outline according to your specific requirements, and consider involving stakeholders and end-users in the design process to ensure the workflow meets their needs effectively.