Roles
		 This table shows the available roles:
	
		
		
		
		| Role | Description | 
|---|---|
| IDM-User | This role is required for access to IDM user interfaces and APIs and grants access to all documents without specific access control lists. | 
| IDM-AdvancedUser | This role is for an advanced user with access to advanced tools such as
							mass update, mass delete, and export.  Caution:  Access to these tools can result in
								considerable damage if used by unskilled personnel.  
This role does not grant privileged access to any
								content. This role implicitly includes the
								  | 
					
| IDM-Administrator | This role is for a user who can create and alter document types and
							configure IDM. This role does
							not grant privileged access to any content. This role implicitly
							includes the IDM-AdvancedUser.  | 
					
| IDM-SuperUser | This role provides full access to documents in IDM. Users with this role bypass the security model
							and are granted access to all content. Assign this role with care as
							this user can access and edit any document in the system with no
							restrictions. Note that a user repository administrator can add people
							to this role. This role implicitly includes the
								IDM-User. | 
					
| IDM-RelatedInformationUser | This role grants access to the IDM Related Information contextual application. A user with this role is not granted access to other IDM interfaces. This role does not affect access to content in IDM, but as with all roles, this role can be used in the Access Control Lists (ACL). It can manage authorization (access to content/documents) within IDM. | 
| IDMCAPTURE-User | This role grants access to the Operator activities in Ephesoft such
							as: 
  | 
					
| IDMCAPTURE-Administrator | This role has the same security as IDMCAPTURE-User, with additional access to Administrator
							activities, such as: 
  | 
					
| IDMCAPTURE-SystemAdministrator | This role has the same security as IDMCAPTURE-Administrator with additional access to System
							Configuration, where access can be added or removed for other
							users |