Users - definition and modification

Users - definition

The system administrator has the ability to manage users having access to the system: adding new users, modify user data, and lock / unlock user access to the system. Removing users is not possible.

To management of users there is "Users" functionality in the "Administration" menu. At the home page of management of users functionality there is search engine of users and a button of adding a new user. Search of users is possible by any combination of the following criteria:

  • name – first name or part of name of the user; capitalization does not matter/li>
  • surname – surname or part of surname of the user; capitalization does not matter
  • login – login or part of user’s login; capitalization does not matter
  • status – user’s status (active or blocked)
  • role – role which the user has/li>
  • unit – administration unit

After entering the search criteria and pressing the search button under the search engine displays a list of users that meet your search criteria. At each of user at the list there is "Edit" button enabling to enter the edit of user’s data.

To add a new user press the "Add new user" button at the users’ search engine. You will see a form of adding a user. Each user must have a unique login and password that meets the following requirements of security policy:

  • password must consist of at least 8 characters
  • password must contain lowercase and uppercase letters, numbers and special characters
  • password must be different from the most recently used passwords by at least three characters
  • password must differ from each of the three most recently used passwords by at least one character

If for the creating user will be indicated "active" status then he will be able to login to the system, otherwise he will not have access to the system until the administrator unlocks his account. If for created user will be marked require periodic password changes, then every 30 days the system will force the user to statutory change his password. If for created user permissible login hours are specified then he will be able to log into system only within these hours. User may have one or more roles. To select more than one role, press the Ctrl key on the keyboard and by clicking the mouse on the names of roles select the appropriate roles. For the user, it should be selected unit where he works and clinics to which he has access ( setting visits, visits encoding and management of services). If the user will have access to more than one unit, press the Ctrl key on your keyboard and by clicking the mouse on the names of units select the appropriate units. If user is a staff then you should pair him with the right person from medical staff, but you have to remember that there is no possibility that the same person from the medical staff had more than one account in the system and after setting user associations with a staff and appointing first visit to this staff there is no longer possible change this association! (If the change of staff with user association was possible, it can lead to situations that the user after such a change could edit medical history recorded by another staff.) You can also specify user's home page, which is the first page that will be open after logging by user to the system. It is also possible to enter a four-digit user PIN, which is used to log into mobile functionalities (event registration functionality by CTC staff via mobile devices).

There is also a "Fast notifications" field in the user data. Currently, one type of such notifications is supported: "notification about the closure of a visit requiring an additional payment". If, when closing a visit, the doctor indicates an additional service in the price list for which the patient should pay extra after the visit, a notification will be displayed on the sliding red panel on the left side of the user, whose data is marked to receive notifications about the closing of a visit requiring an additional fee. The purpose of this solution is to enable registration employees to "intercept" a patient leaving the doctor's office to make the payment. The notification appears on the panel for 5 minutes and then disappears. The notification panel does not block the user's current work and is displayed regardless of the functionality of the jHIS system that the user is currently using, with the exception of popup windows. The notification panel can be extended at any time by moving the mouse cursor over it and hidden by moving the mouse cursor away from it.

To modify, lock or unlock a user account, press "Edit" button at the appropriate user in the user list (in the results) under the search engine. You will see a form of editing user’s data of the structure identical to the form of adding a new user. To change the user password enter the new password twice in the "Password" and "Repeat password" fields (leaving these fields blank means that at the time of saving user’s data, password is not changed, the user will use the existing password). To lock / unlock the user you have to make a change in the "Status" field. Giving the user's role is not visible (effective) for logged users - becomes effective at the start of a new session (when you log back into the system) of the user. After making changes, save them by pressing the "Update" button.

Users who do not have the role of system administrator but who have the ability to manage users with permissions not wider than their own also have the ability to use this functionality, but to a limited extent. They can only manage users who have identical roles as the logged in user and users who have subordinate roles to the roles of the logged in user and users who do not have any roles.

It is possible to register handwritten signatures of users in the system. To register the user's signature, click the "Request or update signature" button in the user data editing form. A signature request will then be generated. They can be handled as described in the "Account" chapter in the "Signing document" section. The registered signature is displayed in the form of a picture in the user data form and is automatically applied to the relevant documents handled by the system.