Global General Permissions
Global General Permissions—what they are and how to use them.
The Basics
Global General Permissions govern specific Yes or No actions a user can take across Namely.
For most actions under Global General Permissions, a role can either use the feature listed or it can’t—you can’t scope the action to only be taken against a specific employee population.
Example Global General Permissions include:
-
The ability to log into Namely
-
The ability to run reports
-
The ability to create, manage, or delete performance reviews
-
The ability to access Namely’s API
-
The ability to manage onboarding
-
The ability to access Namely Payroll from Namely HCM
Certain features in this section can be limited, but these limitations are imposed by other permissions sets contained within a role’s setup and aren’t directly controlled here. These features include:
|
Functionality |
Limitations |
||
|---|---|---|---|---|
|
Reporting engine |
Permits the user access to the reporting engine to create custom reports. A user’s field permissions will always be respected in the reporting engine; users are not able to report on data beyond their permission settings. |
A user in a role that has this feature enabled is only able to pull data on fields they are enabled to see in field group bundles/field group bundle permissions. |
||
|
Integrations payroll admin |
Grants the user access to Namely Payroll as an administrative user. |
This feature only grants an employee access to the Manage Payroll and Run Payroll buttons in HCM. |
||
|
Enables the Add New Person button viewable on the People page. |
This feature only grants a user access to the Add New Person button on the People page, however, the ability to add data to profile fields is not enabled if this button is turned on. |
||
|
API Permanent Access Token |
Allows a user to have full and complete access to the platform, with the ability to manage the API access token and connection. |
An API token created by a profile will inherit the field visibility rules from the role which created it. |