How to configure Permissions

Prev Next

Who can benefit from this guide?

System Administrators and HR Administrators with the right permissions.

If you need access to Security Profiles, please speak to your system administrator or raise an iHelp through Infusion.

What you’ll find in this guide

  1. Understanding the permissions panel

  2. Configuring permissions step-by-step

  3. Testing the security profile

  4. Assigning the Security Profile to users

Understanding the permissions panel

Once you’ve created a security profile (as shown in How to add, edit, and delete Security Profiles), you need to configure what users with this profile can access and do. You can do this in the permissions panel.

Screenshot of the permissions for a security profile called learning and development manager. Some tickboxes are ticked to show how this security profile's permissions could be configured

The permissions panel shows a hierarchical tree with top-level categories like Administration, Employees, Payroll, Leave, and Reporting. Each category contains subcategories and individual permissions.

  • Administration: System administration settings, auditing, security profiles, and user profiles

  • Aspirations: Aspirations configuration and management in Lifecycle

  • Business Data: Business-specific data management using core tables

  • Company Configuration: Locations, organisation components, and positions

  • Employees: Access to employee application, including their profile, action, and lifecycle records. Plus team leave and lifecycle access for managers

  • Import: Data import functions

  • Leave: Leave plans and leave events. Plus access to leave liability extract and leave balance extract functions in leave plans application

  • Library: Library configuration and management

  • Notification: Notification configuration and management

  • Onboarding: Onboarding workflows and processes in Lifecycle

  • Payroll: Payroll Configuration (including Tax Tables), Payroll Processing (including Payroll Management application). Plus costing, employment agreement, holidays, and range tables

  • Performance: Performance configuration and management in Lifecycle

  • Reporting: Access to PowerBI reporting across the Jemini applications: Pay, People, Business, System, Upskilling, and Onboarding

  • Super Funds: Superannuation fund configuration and management

  • Upskilling: Upskilling configuration and management in Lifecycle

  • Work Patterns: Work schedules and patterns configuration and management

  • Your Jemini: Employee self-service features, including their profile, action and lifecycle records

TIP

Some features have permissions spread across multiple categories. For example, Lifecycle permissions (Aspirations, Performance, and Upskilling) control configuration. To give managers access to employee lifecycle activities, enable Lifecycle in the Employees category. For employee access, enable it in Your Jemini.

Each permission has up to five checkboxes:

  • Enable: Access to the functional area

  • View: See records

  • Add: Create new records

  • Change: Edit existing records

  • Delete: Remove records


Configuring permissions step-by-step

  1. Go to SYSTEM > SECURITY PROFILES.

  2. Select the profile card to open the permissions panel.

  3. Start with what users need access to:

    1. Expand the relevant permission category (For example: 'Payroll' to control the Pay bubble).

    2. Tick the Enable box – this makes the bubble or functional area visible in the user's navigation.

  4. Select the appropriate permission levels:

    • Tick View if users need to see records.

    • Tick Add if users need to create new records.

    • Tick Change if users need to edit existing records.

    • Tick Delete if users need to remove records.

      TIP

      Some permissions have dependencies which Jemini handles automatically. For example, if you grant Change permission, Jemini will tick the required View permission for you.

  5. Work through each category systematically:

    • Use the Expand all / Collapse all buttons to manage your view.

    • Review child permissions under each parent category.

    • Some permissions automatically grant related permissions.

  6. Use SEARCH PERMISSIONS to find specific permissions:

    • Enter keywords in the search box at the top of the permissions panel.

    • The tree will filter to show only matching permissions.

    • Clear the search to see the full tree again.

  7. Review your configuration:

    • Select SHOW SELECTED PERMISSIONS ONLY to see what you've enabled.

    • Verify the permissions match your requirements.

    • Check that you haven't over-granted or under-granted access.

  8. Select the Green Tick Button to save the permissions.

TIP

Configure permissions in this order: Enable first, then View, then Add/Change/Delete. This way, you don't miss the foundational permissions.


Testing the security profile

Before assigning the profile to real users, test it thoroughly:

  1. Create a test user account (or use an existing test account):

    1. Go to SYSTEM > USER PROFILES.

    2. Create a test user or select an existing one.

    3. Assign the new security profile to the test user.

  2. Sign in as the test user (or ask a colleague to test):

    1. Use a different browser or incognito window

    2. Sign in with the test user credentials

  3. Verify functional access:

    1. Check which bubbles are visible in the main menu

    2. Confirm they match your intended configuration

    3. Note any unexpected bubbles or missing ones

  4. Test permission levels within each bubble:

    1. Try to view records (should work if View is enabled)

    2. Try to add a record (should work only if Add is enabled)

    3. Try to edit a record (should work only if Change is enabled)

    4. Try to delete a record (should work only if Delete is enabled)

  5. Verify Employee Access:

    1. Check which employees are visible

    2. Confirm it matches the Employee Access level you configured

    3. Try to access employees who should be hidden

  6. Document test results:

    1. Note any issues or unexpected behavior

    2. Record what works as expected

    3. Save this documentation with the profile configuration notes

If testing reveals issues, return to the security profile configuration and adjust the permissions, then test again.


Assigning the Security Profile to users

Go to System > User Profiles to assign the new security profile to user accounts. You can assign more than one profile.

When a user has multiple security profiles, their permissions and employee access combine to give them the highest level of access from any profile. Jemini can't currently apply different permissions to different employee groups on the same user profile.

Screenshot of User Profile with a user profile panel open and the Security Profiles setting outlined to indicate its location in the panel