Category: System Settings

Login to Extrack

Logging in to Extrack Process 1) Go to the Extrack website at extrack.com 2) In the top right-hand corner, click on Login Click on picture to enlarge 3) Complete your login credentials and hit the “Log In” button. Click on picture to enlarge 4) Extrack allows 10 incorrect login attempts at which point the account Read More …

Registering your Organisation as an Extrack Member

Registering your Organisation as an Extrack Member Background The Extrack system is a token based subscription software. It allows an organisation to manage multiple projects, with enterprise level security. Users have access to unlimited projects for a monthly subscription fee or allows a single project to have unlimited users for a monthly project subscription fee. Read More …

System Settings – Project Security – Project Access

Manage Project Security Access Background The process below describes the process in which project security (access to a project) is managed by directly assigning a user to a project or assigning a project to a security group and assigning the security group to a user. Access controls the list of projects a user has available Read More …

Member – User Accounts

Create and Manage Member User Accounts Background The process below describes how to create and manage a member user account. Process 1) Click Settings 2) Under Member click Users, Click on picture to enlarge 3) Before adding a new User check that they do not currently exist by filtering/searching the grid data. 4) Add, edit Read More …

System Security – Assign User Profit Centre

Manage System Security – Assign User Profit Centre Background The process below describes System Security Assignment of Users access to Profit Centre time sheet data. The System Security – Assign User Profit Centre menu item is where you assign profit centre access to a user. The “Time sheet detail report by Profit Centre” will only Read More …

System Security – Assign User Roles

Manage System Security – Assign User Roles Background The process below describes how to manage the System Security Assignment of User Roles. After creating System Security Roles and defining their CRUD settings, Roles must be assigned to each user to establish a users access to menu items and rights based on the role access settings. Read More …

System Security – User Role Settings

Create and Manage System Security User Role Settings Background The process below describes how to develop and manage the System Security User Roles Settings. After creating the System Security Roles, CRUD settings must be applied to each role to establish what rights the user has to that menu item. Where CRUD security is defined as: Read More …

System Security – Roles

Create and Manage System Security Roles Background The process below describes how to develop and manage the list of Members System Security Roles. Upon registration of your company as a Member the user who registered the Company is automatically assigned the Role of “Member Administrator”. The application requires that at all times at least one Read More …

Manage Project List

Create and Manage Projects Background The process below describes how to manage a members list of Projects. Projects are used with external data from other systems and can import/replace existing data in the system. Note that Jobs are intended for internal projects as data cannot be deleted ie Time Sheets. Process 1) Click Settings 2) Read More …