Knowledge Base
Designer
Features Overview
How To
- Custom Field Types
- Create Advanced Automations
- Create Security Policies
- Visual Components & Dependencies
- Automated Notifications
- Automations That Trigger Outbound Communications
- CDT Configuration
- Charts & Graphs: How to Configure
- Create Formulaic Custom Data Type Fields
- Create Patient Facing Assessment (PFA) Folders
- Configure Help Section
- Configure Phone Names
- Customize Action Bar
- Defining Regions and Territories
- Document Types: How To Configure
- Filtering With Message Template Variables
- How to Add Assessments to a Template
- Filtering With Message Template Variables
- How To Associate Assessments with Programs
- How to Create Navigation Layouts
- How To Create an Assessment or Form Template
- Patient Data View
- Opt Out Patients from SMS Communications
- Assessments - How to Add Conditionality
- Create User Notifications
- Create Automated Appointment Reminders
- Turning on Notifications for Communications
- Create PDFs from Forms & Assessments
- Configuring Security Policies
- How to create and configure roles
- Designer: Enable Patient Delete
- Designer: How to Configure Scored Assessments
- Designer: How to Create Automations
- Encounters: Dependencies
- Export Designer Configuration
- Task Creation
- Creating a Message Template
Overview
Create Security Policies
Welkin Health provides your organization the ability to create specific access controls through Security Policies. These access controls require you to:
- Create a Security Policy
- Create Role(s) for this Security Policy: Refer to KBC here: Roles
- Assign Policies to Role(s)
- Provision the Role/Policies to users
- Review and modify final Security Policies
1. Create a Security Policy
- Under Access Control, click “Security Policies” and then “+ New” button. Choose an option:
- “New Empty” creates a policy with only Welkin system fields
- “Read Only” only applies the ability to read system data.
- “Admin Full” grants access to all fields
General | Calendar |
Patient Info | Encounters |
Patient Profile | Insights |
Internal Data Types | Profiles |
Data Types | Communication |
Forms | Export Data |
Documents | Care Plans |
Programs | Dictionaries |
Each category has multiple options, explained here: Security Policy Detail
- Create Role(s) that will leverage this Security Policy: Roles
- Assign Policy to Role(s)
- Provision the Role/Policy to users:
- In Admin, navigate to a user
- In the row pertaining to the environment you are modifying, click on the small edit box to the right of the toggles
- Make sure the user has a Role that contains your new policy (see Tips below)
5. Review and modify final Security Policy
- Return to Designer and make any needed policy tweaks that you would like.
Tips and tricks:
- A “New Empty” policy will show some fields checked that are needed for Welkin’s system to communicate, and cannot be unchecked
- Always review your policies when making configuration changes. Many new elements will require additions to your policies
- Best practice is for a 1:1 Policy to Role assignment to best differentiate users and their permissions
- In Admin, use Role assignment rather than Policy Assignment when granting permissions to avoid unintentionally overlapping permissions
More Questions?
If you have any questions, please email the Customer Success Management team at CSM@welkinhealth.com or contact your Implementation/CSM directly.