Flags

Top  Previous  Next

Flags Flags are used in SDMS mainly to:

1.Change permissions. You can use this feature to give very specific access to documents.

Examples:

Override permissions that are either <not set> or set to Allow.
Toggle between actions/attributes available for processing a document. For example, change ownership ascribed to a document back to the original owner when an action, such as approval, is rejected. For more information, see the group feature in section Configuring Flags.
Narrow access to be very specific within the wider scope of availability according to file type. For example, hide documents except when an action is required by the user involved. For more information, see Example for Using Flags in a Workflow.

Some companies allow deletion of documents under controlled circumstances only. As an example, only one or two appropriate people should be allowed to delete documents but what if the same people should not edit the sensitive information? To satisfy this case, you can configure an Allow Delete flag which allows deletion but denies edit access and attach the flag to a deletion approval step in a workflow. For more information, see Example for Using Flags in a Workflow.

2.Execute a workflow when attached to a document. Additionally during the workflow, flags can be set to change permissions in response to actions. For more information, see Example for Using Flags in a Workflow.
3.Automatically assign an attribute, such as ownership, by default when a document is uploaded. For example, use a default flag named the same as a user, team, project, and so on to identify documents uploaded by any of those entities. For more information, see the section Using Default Flags.

clip0002TIP Flags can be used to re-categorize documents according to needs specific to your facility. After marking documents, you can use the flag categories as filters to list documents according to ownership (or other flag attribute). For information about filtering, see section Searching for Documents.

clip0003NOTE: For more information about configuring permissions in general, see section Permissions. Flags can be used in addition to permissions to exercise even greater control over document access.