| | User that configures roles is the person who assigns permissions to user |
| | Multiple Admins create roles and assign permissions to staff. Staff may or may not be assigning and unassigning users. Student perms change so often they try to distribute the responsibility |
| | 1 Admin configures roles and generally assign staff to roles. Staff that manage the student works will actually assign permissions to their student workers |
| | User needs to see the granular perms of a specific user on the user record for troubleshooting. |
| | Generally a security vulnerability to display user permissions to anyone who can see staff users (User could target other users based on their permissions linger at their workstation etc.) |
| | When identifying why user 1 can not do what user 2 can do we compare the users specific permissions or roles. |
| | When new permissions are added functional roles are updated. Admins then compare roles to verify all necessary functions are included in each role |