Article Details
In the event that an employee leaves your facility, it's important to immediately disable their access to Gingr. In order to preserve historical data associated with user accounts, it's not possible to delete a user in Gingr. Instead, you will Deactivate their account to disable their ability to log into your application.
Deactivate User Accounts
- Navigate to Left-hand Navigation: Reports & More » Users.
- On that page, locate the user account, then select the Active button in the Status column. This will immediately deactivate the user's account and log them out of any session they currently have open. Once deactivated, you will see this button beside their user account info:
- In addition to their access to Gingr, take a moment to think about other software they may have access to (Facebook, Email, Website, Webcams, etc.) and disable their accounts or change common passwords as well.
Deactivate a Specialist
- Navigate to Left-hand Navigation: Reports & More » Users.
- From the Users page, select the Active button under the Status column. This will take the user from Active to Inactive status.
- You will be asked to confirm. Select OK to continue, or Cancel to discontinue. Once deactivated, you will see Inactive beside the employee's information on the Inactive tab.
- To ensure that this user cannot be booked for new appointments, you'll next need to delete their availability. To do, navigate to Left-hand Navigation: Reports and More » Manage Schedules.
- On that page, select the Manage Specialists button.
- Then, delete their availability from that window by selecting the red X in the Actions column next to each of their specialties.
- Save your changes at the bottom of the popup window.
Reference: Deleting a specialists' availability does not delete any services that were already booked with them. You will need to use the Facility Calendar or Services by Date report to reschedule those currently booked appointments with another user!
Related Resources
- Admin Access Reference
- App Permissions Reference
- Restricting User Access by IP Address How-To
- Configure Password Requirements How-To
Comments
0 comments
Article is closed for comments.