Configuring step security for automation processes
Kentico EMS required
Features described on this page require the Kentico EMS license.
Step security allows you to configure which users are allowed to manually move contacts between steps in automation processes. This allows users to:
- Make user choices
- Override the automatic decisions of steps
You can set security options for the following types of steps:
The system applies step security when users manage instances of the automation process for contacts.
Marketing automation permissions
Users can override the security settings of specific automation process steps if they have the following on-line marketing permissions:
- Manage processes - allows users to move contacts to the previous and next steps.
- Move to specific step - allows users to move contacts to any other step in the given automation process.
The permissions allow users to move contacts for all steps in any automation process, regardless of the step security settings.
Allowing users to move contacts from steps
Edit the step by clicking the pencil icon next to its name.
- The Process step properties dialog appears.
Switch to the Security tab.
Select which rolesare allowed to move contacts to the previous or next step:
- None
- Only listed - click Add roles to choose which roles are allowed to move contacts from the step.
- All except listed - click Add roles to block roles from managing the step. Using this option automatically allows all other roles to move contacts from the step.
Configure the step security options for individual user accounts:
- No extra users
- Include the following users - click Add users to choose which users are allowed to move contacts from the step.
- Exclude the following users - click Add users to block specific users from managing the step.
The combination of the user and role settings defines which users are allowed to move contacts from the given step to the previous or next step.
Setting security for steps with multiple branches
For steps that branch into multiple cases (choices), you can configure different security options for individual cases. By default, cases inherit the settings of their step.
Edit individual cases:
- Directly in the process designer
- On the Cases tab in the Process step properties dialog
Open the Security tab of the given case.
Select which roles are allowed to move contacts forward through the corresponding branch:
- Use step settings - uses the security settings of the main step.
- Only listed - click Add roles to choose which roles are allowed to manually select the case for contacts in the step.
- All except listed - click Add roles to block roles from selecting the case. Using this option automatically allows all other roles to select the case for contacts.
Configure the case security options for individual user accounts:
- Use step settings - uses the security settings of the main step.
- Include the following users - click Add users to choose which users are allowed to manually select the case for contacts in the step.
- Exclude the following users - click Add users to block specific users from selecting the case.
The combination of the user and role settings defines which users are allowed to manually move contacts forward to the process branch represented by the given case.