The first step in a new implementation is ensuring the right people have access to the Incentive Management system. To do this, let’s take a look at the security model.
Incentive Management uses a role-based security model, allowing the administrator to grant permissions to all users assigned to a role. Each user is assigned a role based on the level of access required by that user to complete their tasks.
A User is the assigned login name and password for each person who uses Incentive Management.
A Role is a group of permission settings that apply to all users assigned to that role.
Permissions represent the level of access to an object or the ability to perform a specified action.
Permissions to objects or actions are grouped into Permission Sets. You can specify permissions for individual objects or actions or an entire permission set.
In the Incentive Management Security Model figure, our users are assigned one of two roles: Finance/Operations admins and HR Compensation admins. The HR Compensation admins can edit participants, while the Finance admins can only read these records.
