Recommendation Availability
Who is this article for?Users who want to learn about Recommendation Availability
Elevated permissions are not required.
This article outlines an overview of Recommendation Availability within Configuration Action View Methodology. The Recommendation Availability functions can be used as a standalone method for controlling the visibility of Recommendations, or in addition to the Template Design functions discussed in the previous chapter. Recommendation Availability allows users the ability to determine at a much higher level, what Recommendation Origins will be visible when logging in to the system via different methods, or as a specific type of user.
1. Recommendation Availability
- To access the options available to configure, select Recommendation Availability from the main toolbar.
- The following screen is presented.
- These settings can be configured to apply to all users, or against individual users via the Add user override configuration button which will be discussed later in this chapter.
- The table initially presented governs the setting that will be applied to all users.
- Within each intersection of the table the user may determine what level of availability should apply for that scenario. A definition of each possible scenario is explained below.
Origin / System | Audit |
---|---|
Audit Recommendation | Logged in to the Pentana desktop application as an Audit user, searching for Audit related Recommendations |
Risk Action | Logged in to the Pentana desktop application as an Audit user, searching for Enterprise Risk Management related Action |
Risk Action | Logged in to the Pentana desktop application as an Audit user, searching for Project Actions that can only be created through the Online Time Recording module |
Origin / System | Risk Register |
---|---|
Audit Recommendation | Logged in to the Pentana desktop application or the Enterprise Risk Management web-portal as a Risk user, searching for Audit related Recommendations |
Risk Action | Logged in to the Pentana desktop application or the Enterprise Risk Management web-portal as a Risk user, searching for Enterprise Risk Management related Actions |
Risk Action | Logged in to the Pentana desktop application or the Enterprise Risk Management web-portal as a Risk user, searching for Project Actions that can only be created through the Online Time Recording module |
Origin / System | Action Tracking logged in as Audit/Risk User |
---|---|
Audit Recommendation | Logged in to the Business User web-portal as an Audit user or a Risk user, searching for Audit related Recommendations |
Risk Action | Logged in to the Business User web-portal as an Audit user or a Risk user, searching for Enterprise Risk Management related Actions |
Risk Action | Logged in to the Business User web-portal as an Audit user or a Risk user, searching for Project Actions that can only be created through the Online Time Recording module |
For each of these scenarios, it is possible to determine a specific availability rule, by opening the drop-down list that the system provides.
- < All > - All Recommendations or Actions in that scenario will be available
- None - All Recommendations or Actions in that scenario will not be available
- Assigned - All Recommendations or Actions in that scenario will only be available if the user has been assigned to the Recommendation or Action through the designated user-list fields.
- Once these rules have been determined click once on the OK button to save the settings.
- In certain circumstances it may be relevant to configure a different set of rules for specific users, or a group of users belonging to a team.
- To add a different set of availability rules for a specific user, select Add user override configuration.
- Open the drop-down list to Select users to configure.
- In the next window the system provides the same table of availability rules, which can once again be assigned using the options provided.
- Once the appropriate choices have been made select OK to continue.
- In the main Recommendation Availability screen these user-specific configurations appear listed on the left-hand side.
- To perform maintenance on the availability rules applied to specific users, select a user from the list so that they appear highlighted in blue.
- The table on the right-hand side can be updated accordingly. Click OK to confirm any changes made.
- To delete a user-specific configuration, use the checkboxes to select the item and click Delete.
- Please note that the Default settings applied to all users cannot be deleted form the system.
- To log out of the Business User portal, locate the red log out switch from the main toolbar menu.