Filter your external lists according to your users with a filtered list. A filtered list shows certain elements of an external list according to the information that is in the user files. This is a " filter" for your lists. Example. You are the manager in a biscuit and confectionery franchise. You have created a list showing the full range of your biscuits, however your franchisees do not have access to all of your products. This [...]
In your Users page you can create and manage your User, Group leaders and Administrators.
The External Lists page in your Back Office is getting better! Indeed, we added new features to simplify the use of external lists and plus it looks way better!
From the external list page, you can create, modify and delete your external lists. You can also manage their rights.
This Kiz'Tip comes along with the new «Near Miss Report» form available in the library so that you can see a specific example. Feel free to download this form! Have you ever wondered how many lines you have in your table after you collected your data? How to make this figure appear in your customized report? Well, it is possible to set your Kizeo Form once so that you won't have to worry about it anymore. How to calculate the number of [...]
As we are present in 38 countries, Kizeo Forms is available in several languages, which are:
With the last update of your back office, the Users page has been completely redesigned and, following the multi-export, you can now configure several scenarios of email with their own custom reports! The email template! From now on, you have the possibility to set different email template.
Customizable user fields are used to add other fixed values to each users. They allow you to play on the visibility of your elements and sort your lists according to the profile of the user. You are a manager of a sales department. Your salesmen have visits throughout France. You want to reduce their prospecting lists to only see their leads. Moreover, in order to approve the purchase order form, the signature of a manager is necessary.
One of the fundamental points of computer security is the password. It may be useful to help administrators and group leaders by encouraging them to use a complex passwords. These steps below will help you create a process more secure with regular expression (or Regex). The code presented would then be used for letting the user change their passwords.
No results found for ' '.
Back to the Blog