Skip to content

Latest commit

 

History

History
128 lines (98 loc) · 4.46 KB

File metadata and controls

128 lines (98 loc) · 4.46 KB

DataBiologics Interface Access Guide

This guide explains what each interface does and which users have access to each one.

🏥 Interface Overview

1. Impact Dashboard (http://localhost:3000)

Purpose: Analytics, reporting, and impact tracking for healthcare providers and administrators What it does:

  • View patient outcomes and treatment effectiveness
  • Generate reports on clinical data
  • Track key performance indicators
  • Analyze treatment impact metrics

Access Requirement: user.staff must be true Current Users with Access:

2. Super Admin (http://localhost:3001)

Purpose: Administrative interface for system management and user administration What it does:

  • Manage user accounts and permissions
  • Configure system settings
  • Access administrative functions
  • Oversee all system operations

Access Requirement: user.superAdmin must be true Current Users with Access:

3. Patient Portal (http://localhost:3002)

Purpose: Patient-facing interface for personal health information and interactions What it does:

  • View personal health records
  • Complete surveys and assessments
  • Access study information
  • Communicate with care team

Access Requirement: user.patient must be true Current Users with Access:

4. Access Management (http://localhost:3003)

Purpose: User permission and access control management What it does:

  • Manage user roles and permissions
  • Control access to different system areas
  • Assign and modify user capabilities

Access Requirement: user.accessUser must be true Current Users with Access:


👥 Current User Status

Users with Access

User Password Role Can Access
provider1@example.com Secret SuperAdmin Super Admin (3001), Impact Dashboard (3000)
provider2@example.com Secret Staff Impact Dashboard (3000)
medicalassistant@example.com Secret Staff Impact Dashboard (3000)
provider3@example.com Secret AccessUser Access Management (3003)
patient1@example.com Secret Patient Patient Portal (3002)
patient2@example.com Secret Patient Patient Portal (3002)

Users without Access

User Password Role Issue
provider4@example.com Secret None No role assigned
patient3@example.com Secret None No role assigned
patient4@example.com Secret None No role assigned

🎯 Recommendations for Testing

For Impact Dashboard Testing:

For Patient Portal Testing:

For Super Admin Testing:

For Access Management Testing:


🔧 To Grant Additional Access

If you need to grant access to other interfaces:

Grant SuperAdmin Access:

docker-compose exec backend rails runner "user = User.find_by(email: 'EMAIL'); user.vp_authn_roles = ['SuperAdmin']; user.save!"

Grant AccessUser Access:

docker-compose exec backend rails runner "user = User.find_by(email: 'EMAIL'); user.vp_authn_roles = ['AccessUser']; user.save!"

Grant Multiple Roles:

docker-compose exec backend rails runner "user = User.find_by(email: 'EMAIL'); user.vp_authn_roles = ['Staff', 'SuperAdmin']; user.save!"

📋 Summary

  • Impact Dashboard: 3 users with access (Staff/SuperAdmin roles)
  • Super Admin: 1 user with access (SuperAdmin role)
  • Patient Portal: 2 users with access (Patient role)
  • Access Management: 1 user with access (AccessUser role)

All interfaces now have users with appropriate access for testing!