Groups and Security

Groups and Security

Overview


Mileposts groups are a quick and very intuitive way to manage permissions for groups of users. Mileposts Security Groups have a set of authorizations associated with them. Any user assigned to a group will inherit that set of authorizations. Those authorizations consist of both permissions and securables as the following diagram depicts.




Mileposts Groups


Mileposts comes with a set of groups already defined with a set of authorizations that are well accepted across most school districts. The following table outlines these groups and a high level overview of the authorizations that are associated with each group.


Please remember that School Scope works in conjunction with authorizations.


The following groups are configured in the initial setup. These groups can be modified by our clients services to meet district needs. Note: The permissions outlined below may not reflect what you currently have in your district.


GroupSchool Scope and Authorizations
 District Administration The users in this group are generally given full historical school scope to all schools and have permission to view and manage student data for all students within their scope.
 Mileposts Domain AdministratorThe users in this group can manage users and passwords.
 Mileposts Domain MasterThe users in this group can manage all aspects of Mileposts setup and administration.
 School CounselorsThe users in this group are generally given full historical school scope to their school. The permissions associated with this group will give them view access to all students within their scope.
School PrincipalThe users in this group (Principals) will generally be given Full Historical School Scope for their school. The permissions associated with this group will then give these users complete oversight and access to all student data at their school.
Special Services / Special Ed Staff

The users in this group are generally given full school scope to their school if they do not have classes assigned to them. The permissions associated with this group will give them view access to all students within their scope.

 TeacherThe users in this group will generally be given Limited School Scope to their school which limits their scope to students in their classes. The permissions associated with this group will allow them to manage plans, interventions, behavior incidents,  progress monitors and assessments for students they have scope to.
 Test Coordinators The users in this group are given permission to manage special testing accommodations and designated support across their scope.


A district may add / modify / delete groups and the permissions that are associated with these groups.
    • Related Articles

    • Security Groups

      Security Groups are used to group staff together that have the same security access/needs. This helpful and saves time by creating a group and adding all the people to that group rather than adding all the security or access to each individual staff ...
    • Security (Complete Guide)

      The security section is used for granting permissions and access to different tools or tasks in Mileposts Security Groups Groups A table of current Security Groups  Add new Group General Tab Name  Name of Security Group Public Key This will be auto ...
    • Organizational Groups

      Organizational Groups are used to group users based on their organization/school. This is different from Groups or User Tags. Groups are based on the permissions that a user is granted. User Tags are used to group users based on similar ...
    • Users (Complete Guide)

      The User section of Admin Backstage is where all the following user management is done: User Accounts User Tags Organizational Groups Family Management User Accounts Click User Accounts First page of User Accounts is a table of users The headers on ...
    • General Concepts

      Overview The Mileposts security framework consists of a variety of security features to prevent unauthorized access to student information. The security framework includes highly granular authentication and authorization mechanisms. Authentication ...