System – User Creation, Profiles and Access Rules
Purpose
This configuration defines how users access UNEEVO, which permissions they receive, and how security is applied across the entire environment.
By managing user accounts, access profiles, and security rules, administrators ensure:
-
Controlled and secure access to the platform
-
Consistent role-based operations
-
Proper governance across companies and modules
This setup is essential before granting system access to operational or administrative teams.
Access Path
Control Center → System → Access Profiles / Users / Security Configuration
Configuration Structure
UNEEVO divides access management into three complementary areas:
| Area | Description | Purpose |
|---|---|---|
| Access Profiles | Defines roles and permissions. | Controls what users can view, edit, or manage. |
| Users | Stores user accounts and links to HR records. | Creates, edits, activates or deactivates users. |
| Security Configuration | Defines tenant-wide default rules. | Establishes admin profiles and default permissions. |
These areas work together to enforce a secure and well-structured access model.
1. Access Profiles
Access Profiles define what each user can see and do inside UNEEVO.
They can be tailored for functions such as HR Administrator, Project Manager, etc.

Default Access Profiles
| Profile Name | Description |
|---|---|
| Default Full Access User Profile | Grants unrestricted access to all modules. Typically used for general admin users. |
| System Administrator Profile | Highest-level profile for tenant administrators managing configurations and system security. |
➕ Creating a New Access Profile
-
Click Add Access Profile.
-
Enter Name and Description.
-
Open each module/section (e.g., Contract, Allocation, Dashboard, Department).
-
Assign permissions:
-
Read → view-only
-
Full → create, edit, delete
-
-
Select allowed Companies (optional).
-
Click Save.
Profiles can be edited at any time as organizational needs evolve.
2. Users
The Users section manages the creation and maintenance of system user accounts.
Each user must be associated with an Access Profile and can optionally be linked to HR data.

Creating a New User
-
Click Add User.
-
Fill in the following:
-
First Name, Last Name
-
Display Name (presentation name in the system)
-
E-mail (unique)
-
-
Optional links:
-
Contract → connects account to the employee’s active contract
-
Person → links to their HR profile
-
Access Profile → defines permissions
-
-
Enable Send Password Setup Email to invite the user automatically.
-
Click Save.
Users update their password and personal settings at first login.
3. Security Configuration
This section defines global security rules that apply to the entire tenant, ensuring consistency and governance.

| Field | Description |
|---|---|
| Tenant Admin Profile | Defines which profile has the highest-level access (usually System Administrator Profile). |
| Default User Profile | Sets which access profile is assigned automatically to all new users. |
Administrators may adjust these defaults as the organizational structure changes.
Best Practices
-
Assign System Administrator Profile only to trusted technical administrators.
-
Ensure at least one active full-access profile exists for safety.
-
Use limited profiles (e.g., Project Access) for operational users.
-
Deactivate old or unused accounts regularly to maintain security compliance.
-
Review Access Profiles periodically to ensure they still match internal processes.
Related Articles (Direct Setup Dependencies)
Global Setup Overview (General & System Configuration)
System Parameters Overview
System Configuration – Companies Setup
Help Center