Frequently Asked Questions - Security
Securities for applications in AMS work the same way as they did in KERMIT. It is important that the Company Administrator ensures the proper securities are maintained. Currently, as soon as a Company Administrator grants a person Application security, access is granted to view (and edit prior to submission) all applications immediately. If you do not know who your Company Administrator is, please contact firstname.lastname@example.org and request the contact details. For more information on company administration, please refer to the Permit Operations and Administration Manual or the External KERMIT Company Admin How To Document.
Securities for applications will work the same as they currently do in Kermit. Once granted the ‘applications’ security role for a company, a user can see all applications started by the company.
Survey companies will need to get access to the Application Analysis role from the applicant company. Once access is gained, users will be able to use the Application Analysis tool without constraints. The Application Analysis role and the Application Analysis tool however, do not allow the user authority to view or edit applications for the applicant company unless the applicant has granted them the Application security role.
The Commission has not made any changes to the way application security roles work with the implementation of AMS. Applicants who give application security roles to consultants and/or representatives are responsible for managing the security of their applications. Representatives will have access to all applications for a specific company once granted application security role.