Using CiviCRM - Second Edition by Erik Hommel & Joseph Murray & Brian P. Shaughnessy

Using CiviCRM - Second Edition by Erik Hommel & Joseph Murray & Brian P. Shaughnessy

Author:Erik Hommel & Joseph Murray & Brian P. Shaughnessy [Hommel, Erik]
Language: eng
Format: azw3
Publisher: Packt Publishing
Published: 2016-08-31T04:00:00+00:00


Occasionally, it can be convenient to create a hierarchy of groups for communication purposes. For example, a chapter-based organization that manages newsletter subscriptions at the local level may have a central communication product that is sent to all subscribers of local subscriptions. If there were hundreds of local chapters, such as constituency associations in a political party, it would be quite elegant to have each local newsletter subscriber group set up as a child of the central one if the opt-in messages indicated that both a central and local newsletter would be sent to subscribers. Users would be able to select a single list, and staff would not need to worry about lists getting out of sync. This hierarchical functionality is handled by defining a parent for a group.

When editing the settings for a group, parent groups can be added one at a time by selecting them in the Add Parent field and clicking on Save. Similarly, parent groups can be deleted by selecting the group under Remove Parent, and then clicking on Save.

While you are on this screen, note the Reserved Group option. CiviCRM defines a permission to enable access to reserved groups; by selecting this option, you require the logged-in user have that permission in order to modify the group. If your organization has staff with multiple levels of system access, this provides a useful way to lock down certain groups and prevent lower-level staff from modifying them.

In the Group Type row, you may have noticed an option to flag a group for the Access Control use. We've intentionally skipped the discussion of this field, as it is better handled when reviewing CiviCRM's access control functionality (refer to Chapter 3, Installation, Configuration, and Maintenance).



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Deep Learning with Python by François Chollet(12630)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6442)
Kotlin in Action by Dmitry Jemerov(5089)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3939)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3101)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2887)
The Art Of Deception by Kevin Mitnick(2621)
Drugs Unlimited by Mike Power(2478)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2448)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2414)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2320)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2274)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2200)
JavaScript by Example by S Dani Akash(2152)
DarkMarket by Misha Glenny(2095)
Wireless Hacking 101 by Karina Astudillo(2091)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2089)