-
Notifications
You must be signed in to change notification settings - Fork 1
/
perms.go
907 lines (894 loc) · 90.2 KB
/
perms.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
package imqsauth
import (
"github.com/IMQS/authaus"
)
// ======================
// DO NOT EDIT THIS FILE!
// ======================
//
// This code was generated by the permissions_generator.rb script.
// Should you wish to add a new IMQS V8 permission, follow the instructions
// to regenerate this class at:
//
// https://imqssoftware.atlassian.net/wiki/display/ASC/Generating+Permissions
//
// IMQS permission bits (each number in the range 0..65535 means something)
const (
PermReservedZero authaus.PermissionU16 = 0 // Avoid the danger of having a zero mean something
PermAdmin authaus.PermissionU16 = 1 // Super-user who can control all aspects of the auth system
PermEnabled authaus.PermissionU16 = 2 // User is allowed to use the system. Without this no request is authorized
PermBulkSms authaus.PermissionU16 = 4 // User is allowed to send SMS messages.
PermPcsSuperUser authaus.PermissionU16 = 100 // User can perform all actions in PCS}
PermPcsBudgetAddAndDelete authaus.PermissionU16 = 101 // User is allowed to add and delete a budget to PCS
PermPcsBudgetUpdate authaus.PermissionU16 = 102 // User is allowed to update a budget in PCS
PermPcsBudgetView authaus.PermissionU16 = 103 // User is allowed to view budgets in PCS.
PermPcsProjectAddAndDelete authaus.PermissionU16 = 104 // User is allowed to add and delete a project to PCS
PermPcsProjectUpdate authaus.PermissionU16 = 105 // User is allowed to update a project in PCS
PermPcsProjectView authaus.PermissionU16 = 106 // User is allowed to view projects in PCS
PermPcsProgrammeAddAndDelete authaus.PermissionU16 = 107 // User is allowed to add and delete a programme to PCS
PermPcsProgrammeUpdate authaus.PermissionU16 = 108 // User is allowed to update a programme in PCS
PermPcsProgrammeView authaus.PermissionU16 = 109 // User is allowed to view programmes in PCS
PermPcsLookupAddAndDelete authaus.PermissionU16 = 110 // User is allowed to add a lookup/employee/legal entity to PCS
PermPcsLookupUpdate authaus.PermissionU16 = 111 // User is allowed to update a lookup/employee/legal entity in PCS
PermPcsLookupView authaus.PermissionU16 = 112 // User is allowed to view lookup/employee/legal entity in PCS
PermPcsBudgetItemList authaus.PermissionU16 = 113 // User is allowed to view budget items in PCS
PermPcsDynamicContent authaus.PermissionU16 = 114 // User is allowed to get dynamic configuration
PermPcsProjectsUnassignedView authaus.PermissionU16 = 115 // User is allowed to view all the projects that are not assigned to programmes
PermPcsBudgetItemsAvailable authaus.PermissionU16 = 116 // User is allowed to view the allocatable budget items
PermPcsProjectViewAll authaus.PermissionU16 = 117 // User is allowed to view all projects
PermPcsProjectEditAll authaus.PermissionU16 = 118 // User is allowed to edit all projects
PermReportCreator authaus.PermissionU16 = 200 // Can create reports
PermReportViewer authaus.PermissionU16 = 201 // Can view reports
PermImporter authaus.PermissionU16 = 300 // User is allowed to handle data imports
PermFileDrop authaus.PermissionU16 = 301 // User is allowed to drop files onto IMQS Web
PermMm authaus.PermissionU16 = 400 // MM
PermMmWorkRequestView authaus.PermissionU16 = 401 // Work Request View
PermMmWorkRequestAddAndDelete authaus.PermissionU16 = 402 // Work Request Add/Delete
PermMmWorkRequestUpdate authaus.PermissionU16 = 403 // Work Request Update
PermMmPmWorkRequestAddAndDelete authaus.PermissionU16 = 404 // MM Work Request Add/Delete
PermMmPmWorkRequestUpdate authaus.PermissionU16 = 405 // MM Work Request Update
PermMmPmWorkRequestView authaus.PermissionU16 = 406 // MM Work Request View
PermMmPmRegionalManagerAddAndDelete authaus.PermissionU16 = 407 // MM Work Request Regional Manager Add/Delete
PermMmPmRegionalManagerUpdate authaus.PermissionU16 = 408 // MM Work Request Regional Manager Update
PermMmPmRegionalManagerView authaus.PermissionU16 = 409 // MM Work Request Regional Manager View
PermMmPmDivisionalManagerAddAndDelete authaus.PermissionU16 = 410 // MM Work Request Divisional Manager Add/Delete
PermMmPmDivisionalManagerUpdate authaus.PermissionU16 = 411 // MM Work Request Divisional Manager Update
PermMmPmDivisionalManagerView authaus.PermissionU16 = 412 // MM Work Request Divisional Manager View
PermMmPmGeneralManagerAddAndDelete authaus.PermissionU16 = 413 // MM Work Request General Manager Add/Delete
PermMmPmGeneralManagerUpdate authaus.PermissionU16 = 414 // MM Work Request General Manager Update
PermMmPmGeneralManagerView authaus.PermissionU16 = 415 // MM Work Request General Manager View
PermMmPmRoutingDepartmentAddAndDelete authaus.PermissionU16 = 416 // MM Work Request Routing Department Add/Delete
PermMmPmRoutingDepartmentUpdate authaus.PermissionU16 = 417 // MM Work Request Routing Department Update
PermMmPmRoutingDepartmentView authaus.PermissionU16 = 418 // MM Work Request Routing Department View
PermMmFormBuilder authaus.PermissionU16 = 419 // MM Form Builder
PermMmLookup authaus.PermissionU16 = 420 // MM Lookup
PermMmServiceRequest authaus.PermissionU16 = 421 // MM Service Request
PermMmSetup authaus.PermissionU16 = 422 // MM Setup
PermMmSuperUser authaus.PermissionU16 = 423 // MM Super User
PermMmSetupWorkFlow authaus.PermissionU16 = 424 // MM Setup Workflow
PermMmSetupPM authaus.PermissionU16 = 425 // MM Setup Preventative Maintenance
PermMmSetupPMSchedule authaus.PermissionU16 = 426 // MM Setup Preventative Maintenance Schedule
PermMmIncidentLogger authaus.PermissionU16 = 427 // MM Incident Logger
PermMmResourceManagerView authaus.PermissionU16 = 428 // MM Resource Manager View
PermMmResourceManagerAddAndDelete authaus.PermissionU16 = 429 // MM Resource Manager Add/Delete
PermMmResourceManagerUpdate authaus.PermissionU16 = 430 // MM Resource Manager Update
PermMmTimeAndCostView authaus.PermissionU16 = 431 // MM Time and Cost View
PermMmTimeAndCostAddAndDelete authaus.PermissionU16 = 432 // MM Time and Cost Add/Delete
PermMmTimeAndCostUpdate authaus.PermissionU16 = 433 // MM Time and Cost Update
PermMmDocuments authaus.PermissionU16 = 434 // MM Documents
PermMmMeterMaintenance authaus.PermissionU16 = 435 // MM Meter Maintenance Map
PermMmReAssignEditOfDisabledControl authaus.PermissionU16 = 436 // Disabled controls become active for a user with this permission
PermMmEmployeeView authaus.PermissionU16 = 437 // MM Employee View
PermMmEmployeeAddAndDelete authaus.PermissionU16 = 438 // MM Employee Add/Delete
PermMmEmployeeUpdate authaus.PermissionU16 = 439 // MM Employee Update
PermMmFleetView authaus.PermissionU16 = 440 // MM Fleet View
PermMmFleetAddAndDelete authaus.PermissionU16 = 441 // MM Fleet Add/Delete
PermMmFleetUpdate authaus.PermissionU16 = 442 // MM Fleet Update
PermMmMaterialView authaus.PermissionU16 = 443 // MM Material View
PermMmMaterialAddAndDelete authaus.PermissionU16 = 444 // MM Material Add/Delete
PermMmMaterialUpdate authaus.PermissionU16 = 445 // MM Material Update
PermMmContractorView authaus.PermissionU16 = 446 // MM Contractor View
PermMmContractorAddAndDelete authaus.PermissionU16 = 447 // MM Contractor Add/Delete
PermMmContractorUpdate authaus.PermissionU16 = 448 // MM Contractor Update
PermMmContractorDocsView authaus.PermissionU16 = 449 // MM Contractor Documents View
PermMmContractorDocsAddAndDelete authaus.PermissionU16 = 450 // MM Contractor Documents Add/Delete
PermMmContractorDocsUpdate authaus.PermissionU16 = 451 // MM Contractor Documents Update
PermMmStandardTimesView authaus.PermissionU16 = 452 // MM Standard Times View
PermMmStandardTimesAddAndDelete authaus.PermissionU16 = 453 // MM Standard Times Add/Delete
PermMmStandardTimesUpdate authaus.PermissionU16 = 454 // MM Standard Times Update
PermMmTariffsView authaus.PermissionU16 = 455 // MM Tariffs View
PermMmTariffsAddAndDelete authaus.PermissionU16 = 456 // MM Tariffs Add/Delete
PermMmTariffsUpdate authaus.PermissionU16 = 457 // MM Tariffs Update
PermMmIncidentLoggerView authaus.PermissionU16 = 458 // MM Incident Logger View
PermMmIncidentLoggerAddAndDelete authaus.PermissionU16 = 459 // MM Incident Logger Add/Delete
PermMmIncidentLoggerUpdate authaus.PermissionU16 = 460 // MM Incident Logger Update
PermMmLeaveManagementView authaus.PermissionU16 = 461 // MM Leave Management View
PermMmLeaveManagementAddAndDelete authaus.PermissionU16 = 462 // MM Leave Management Add/Delete
PermMmLeaveManagementUpdate authaus.PermissionU16 = 463 // MM Leave Management Update
PermMmProjectCodeManagementView authaus.PermissionU16 = 464 // MM Project Code Management View
PermMmProjectCodeManagementAddAndDelete authaus.PermissionU16 = 465 // MM Project Code Management Add/Delete
PermMmProjectCodeManagementUpdate authaus.PermissionU16 = 466 // MM Project Code Management Update
PermMmProjectSapManagementView authaus.PermissionU16 = 467 // MM Project Sap Management View
PermMmProjectSapManagementAddAndDelete authaus.PermissionU16 = 468 // MM Project Sap Management Add/Delete
PermMmProjectSapManagementUpdate authaus.PermissionU16 = 469 // MM Project Sap Management Update
PermWipEnabled authaus.PermissionU16 = 500 // User is allowed to use the WIP module
PermWipWorkflowStart authaus.PermissionU16 = 501 // User is allowed to start a workflow
PermWipWorkflowSuspend authaus.PermissionU16 = 502 // User is allowed to suspend a workflow
PermWipWorkflowDiscard authaus.PermissionU16 = 503 // User is allowed to discard a workflow
PermWipProjectView authaus.PermissionU16 = 510 // User is allowed to view a WIP project
PermWipProjectAdd authaus.PermissionU16 = 511 // User is allowed to add a WIP project
PermWipProjectEdit authaus.PermissionU16 = 512 // User is allowed to edit a WIP project
PermWipProjectDelete authaus.PermissionU16 = 513 // User is allowed to delete a WIP project
PermWipComponentView authaus.PermissionU16 = 514 // User is allowed to view a WIP component
PermWipComponentAdd authaus.PermissionU16 = 515 // User is allowed to add a WIP component
PermWipComponentEdit authaus.PermissionU16 = 516 // User is allowed to edit a WIP component
PermWipComponentDelete authaus.PermissionU16 = 517 // User is allowed to delete a WIP component
PermWipActualView authaus.PermissionU16 = 518 // User is allowed to view a WIP actual
PermWipActualAdd authaus.PermissionU16 = 519 // User is allowed to add a WIP actual
PermWipActualEdit authaus.PermissionU16 = 520 // User is allowed to edit a WIP actual
PermWipActualDelete authaus.PermissionU16 = 521 // User is allowed to delete a WIP actual
PermWipBudgetView authaus.PermissionU16 = 522 // User is allowed to view a WIP budget
PermWipBudgetAdd authaus.PermissionU16 = 523 // User is allowed to add a WIP budget
PermWipBudgetEdit authaus.PermissionU16 = 524 // User is allowed to edit a WIP budget
PermWipBudgetDelete authaus.PermissionU16 = 525 // User is allowed to delete a WIP budget
PermWipCapitalize authaus.PermissionU16 = 526 // User is allowed to perform capitalization tasks
PermEnergyConfigAddAndDelete authaus.PermissionU16 = 600 // User is allowed to add and delete an energy site configuration
PermEnergyConfigUpdate authaus.PermissionU16 = 601 // User is allowed to update an energy site configuration
PermEnergyConfigView authaus.PermissionU16 = 602 // User is allowed to view an energy site configuration
PermEnergyConfigLockUnlock authaus.PermissionU16 = 603 // User is allowed to lock/unlock site configuration
PermEnergyGeneratorsStartStop authaus.PermissionU16 = 604 // User is allowed to start/stop generators
PermEnergyGateUnlock authaus.PermissionU16 = 605 // User is allowed to unlock gate
PermEnergySimSwitch authaus.PermissionU16 = 606 // User is allowed to switch site controller SIM
PermEnergyAlarmsMute authaus.PermissionU16 = 607 // User is allowed to mute site alarms
PermEnergyAnalogDataRefresh authaus.PermissionU16 = 608 // User is allowed to refresh analog data
PermEnergyControllerFirmwareVersionRefresh authaus.PermissionU16 = 609 // User is allowed to refresh controller firmware version
PermEnergyTimeSync authaus.PermissionU16 = 610 // User is allowed to synchronise controller clock with server
PermEnergyAlarmsAcknowledge authaus.PermissionU16 = 611 // User is allowed to acknowledge alarms
PermEnergyGateAccessFirmwareVersionRefresh authaus.PermissionU16 = 612 // User is allowed to refresh gate access firmware version
PermEnergySiteInfoEdit authaus.PermissionU16 = 613 // User is allowed to edit site info
PermEnergySitePACEdit authaus.PermissionU16 = 614 // User is allowed to edit site PAC
PermDevconProjectEdit authaus.PermissionU16 = 700 // User is allowed to edit projects
PermDevconProjectCreate authaus.PermissionU16 = 701 // User is allowed to create new projects
PermDevconProjectDelete authaus.PermissionU16 = 702 // User is allowed to delete projects
PermDevconProjectMerge authaus.PermissionU16 = 703 // User is allowed to merge projects
PermDevconApplicationEdit authaus.PermissionU16 = 704 // User is allowed to edit applications
PermDevconApplicationCreate authaus.PermissionU16 = 705 // User is allowed to create new applications
PermDevconApplicationDelete authaus.PermissionU16 = 706 // User is allowed to delete applications
PermDevconLookupEdit authaus.PermissionU16 = 707 // User is allowed to edit lookups, such as applicant and organisation
PermDevconLookupCreate authaus.PermissionU16 = 708 // User is allowed to create new lookups
PermDevconLookupDelete authaus.PermissionU16 = 709 // User is allowed to delete lookups
PermDevconLookupManagement authaus.PermissionU16 = 710 // User is allowed to access the lookup management page and manage lookups
PermDevconTemplateManagement authaus.PermissionU16 = 711 // User is allowed to access the feedback template management page and update templates
PermDevconReportViewing authaus.PermissionU16 = 712 // User is allowed to view reports
PermHydroWorkOrderCreation authaus.PermissionU16 = 800 // User is allowed to view and use the hydrojet work order creation tool
PermWmm authaus.PermissionU16 = 900 // User is allowed to access the Meter Maintenance
PermWmmSearchEdit authaus.PermissionU16 = 901 // User can access the Seach and Edit module
PermWmmCreateIncident authaus.PermissionU16 = 902 // User can create an Incident
PermWmmEditMeter authaus.PermissionU16 = 903 // User can edit a meters details
PermWmmDm authaus.PermissionU16 = 904 // User can access the Dropdown Manager
PermWmmDmEdit authaus.PermissionU16 = 905 // User can add, edit or delete a Dropdown item
PermWmmExport authaus.PermissionU16 = 906 // User can access the Export Manager
PermWmmReports authaus.PermissionU16 = 907 // User can access the Meter Maintenance reports
PermImqsDeveloper authaus.PermissionU16 = 999 // IMQS Developer
PermAssetsModuleAccess authaus.PermissionU16 = 1100 // User is allowed to access the Assets module
PermCogtaModuleAccess authaus.PermissionU16 = 1101 // User is allowed to access the COGTA module
PermConditionAssessmentModuleAccess authaus.PermissionU16 = 1102 // User is allowed to access the Condition Assessment module
PermDocumentExplorerModuleAccess authaus.PermissionU16 = 1103 // User is allowed to access the Document Explorer module
PermElectricityModuleAccess authaus.PermissionU16 = 1104 // User is allowed to access the Electricity module
PermElectricityDemandModuleAccess authaus.PermissionU16 = 1105 // User is allowed to access the Electricity Demand module
PermElectricityDemoModuleAccess authaus.PermissionU16 = 1106 // User is allowed to access the Electricity Demo module
PermEnergyModuleAccess authaus.PermissionU16 = 1107 // User is allowed to access the Energy module
PermIndigentModuleAccess authaus.PermissionU16 = 1108 // User is allowed to access the Indigent module
PermLandUseModuleAccess authaus.PermissionU16 = 1109 // User is allowed to access the Land Use module
PermMaintenanceManagementModuleAccess authaus.PermissionU16 = 1110 // User is allowed to access the Maintenance Management module
PermMeterMaintenanceModuleAccess authaus.PermissionU16 = 1111 // User is allowed to access the Meter Maintenance module
PermPcsModuleAccess authaus.PermissionU16 = 3 // User is allowed to access the PCS module
PermPropertiesandBuildingsModuleAccess authaus.PermissionU16 = 1113 // User is allowed to access the Properties and Buildings module
PermRevenueEnhancementModuleAccess authaus.PermissionU16 = 1114 // User is allowed to access the Revenue Enhancement module
PermRoadsModuleAccess authaus.PermissionU16 = 1115 // User is allowed to access the Roads module
PermSewerModuleAccess authaus.PermissionU16 = 1116 // User is allowed to access the Sewer module
PermSewerPRPModuleAccess authaus.PermissionU16 = 1117 // User is allowed to access the Sewer PRP module
PermStormwaterModuleAccess authaus.PermissionU16 = 1118 // User is allowed to access the Stormwater module
PermTelcosModuleAccess authaus.PermissionU16 = 1119 // User is allowed to access the Telcos module
PermWaterModuleAccess authaus.PermissionU16 = 1120 // User is allowed to access the Water module
PermWaterDemandModuleAccess authaus.PermissionU16 = 1121 // User is allowed to access the Water Demand module
PermWaterPRPModuleAccess authaus.PermissionU16 = 1122 // User is allowed to access the Water PRP module
PermWipModuleAccess authaus.PermissionU16 = 1123 // User is allowed to access the WIP module
PermDevelopmentControlModuleAccess authaus.PermissionU16 = 1124 // User is allowed to access the Development Control module
PermRoadSignsModuleAccess authaus.PermissionU16 = 1125 // User is allowed to access the Road Signs module
PermElectricityRPModuleAccess authaus.PermissionU16 = 1126 // User is allowed to access the Electricity RP module
PermFacilitiesModuleAccess authaus.PermissionU16 = 1127 // User is allowed to access the Facilities module
PermResourceManagerModuleAccess authaus.PermissionU16 = 1128 // User is allowed to access the Resource Manager module
PermNewMm authaus.PermissionU16 = 1200 // User can access the MM module
PermNewMmIl authaus.PermissionU16 = 1201 // User can access the Incident Logger module
PermNewMmIlCreateBulkIncidents authaus.PermissionU16 = 1202 // User can create bulk incidents
PermNewMmIlCreateAdd authaus.PermissionU16 = 1203 // User can add a new incident
PermNewMmIlArchive authaus.PermissionU16 = 1204 // User can archive an incident
PermNewMmIlEditLogRequest authaus.PermissionU16 = 1205 // User can edit incident in Log Request state
PermNewMmIlViewLogRequest authaus.PermissionU16 = 1206 // User can view incident in Log Request state
PermNewMmIlLogRequestSubmitIncident authaus.PermissionU16 = 1207 // User can submit an incident
PermNewMmIlEditAllocateDepot authaus.PermissionU16 = 1208 // User can edit incident in Allocate Depot state
PermNewMmIlViewAllocateDepot authaus.PermissionU16 = 1209 // User can view incident in Allocate Depot state
PermNewMmIlAllocateDepotApprove authaus.PermissionU16 = 1210 // User can approve incident in Allocate Depot state
PermNewMmIlAllocateDepotPostpone authaus.PermissionU16 = 1211 // User can postpone incident in Allocate Depot state
PermNewMmIlAllocateDepotReject authaus.PermissionU16 = 1212 // User can reject incident in Allocate Depot state
PermNewMmIlEditProcessTask authaus.PermissionU16 = 1213 // User can edit incident in Process Task state
PermNewMmIlViewProcessTask authaus.PermissionU16 = 1214 // User can view incident in Process Task state
PermNewMmIlProcessTaskPostpone authaus.PermissionU16 = 1215 // User can postpone incident in Process Task state
PermNewMmIlProcessTaskReject authaus.PermissionU16 = 1216 // User can reject incident in Process Task state
PermNewMmIlProcessTaskResolve authaus.PermissionU16 = 1217 // User can resolve incident in Process Task state
PermNewMmIlProcessTaskClose authaus.PermissionU16 = 1218 // User can close incident in Process Task state
PermNewMmIlMap authaus.PermissionU16 = 1219 // User can view the map
PermNewMmIlLinkedRequests authaus.PermissionU16 = 1220 // User can view the linked requests
PermNewMmIlFollowUp authaus.PermissionU16 = 1221 // User can view the follow up incidents
PermNewMmIlAuditTrail authaus.PermissionU16 = 1222 // User can view the Audit Trail
PermNewMmIlPrintPreview authaus.PermissionU16 = 1223 // User can view the Print Preview
PermNewMmIlDocuments authaus.PermissionU16 = 1224 // User can view the Documents
PermNewMmIlSapNotificationImportCreateAdd authaus.PermissionU16 = 1225 // User can import SAP Notifitications
PermNewMmIlReportsView authaus.PermissionU16 = 1226 // User can view Incident Logger Reports
PermNewMmTc authaus.PermissionU16 = 1227 // User can access the Time and Cost Module
PermNewMmTcCreateAdd authaus.PermissionU16 = 1228 // User can create a new Time Sheet
PermNewMmTcEdit authaus.PermissionU16 = 1229 // User can edit an Time Sheet
PermNewMmTcView authaus.PermissionU16 = 1230 // User can view a Time Sheet
PermNewMmTcArchive authaus.PermissionU16 = 1231 // User can archive a Time Sheet
PermNewMmTcTimeExports authaus.PermissionU16 = 1232 // User can export Time Sheets
PermNewMmTcReportsView authaus.PermissionU16 = 1233 // User can view Time and Cost Reports
PermNewMmRm authaus.PermissionU16 = 1234 // User can access the Resource Manager Module
PermNewMmRmEmployeeCreateAddEmployee authaus.PermissionU16 = 1235 // User can add a new Employee
PermNewMmRmEmployeeView authaus.PermissionU16 = 1236 // User can view Employees grid and Employee data
PermNewMmRmEmployeeEdit authaus.PermissionU16 = 1237 // User can edit an Employee
PermNewMmRmEmployeeArchive authaus.PermissionU16 = 1238 // User can archive an Employee
PermNewMmRmEmployeeEditGeneral authaus.PermissionU16 = 1239 // User can edit Employee data in the General Tab
PermNewMmRmEmployeeViewGeneral authaus.PermissionU16 = 1240 // User can view Employee data in the General Tab
PermNewMmRmEmployeeEditAppointment authaus.PermissionU16 = 1241 // User can edit Employee data in the Appointment Tab
PermNewMmRmEmployeeViewAppointment authaus.PermissionU16 = 1242 // User can view Employee data in the Appointment Tab
PermNewMmRmEmployeeEditLicense authaus.PermissionU16 = 1243 // User can edit Employee data in the Driver’s License Tab
PermNewMmRmEmployeeViewLicense authaus.PermissionU16 = 1244 // User can view Employee data in the Driver’s License Tab
PermNewMmRmEmployeeEditTimeProgram authaus.PermissionU16 = 1245 // User can edit Employee data in the Time Program Tab
PermNewMmRmEmployeeViewTimeProgram authaus.PermissionU16 = 1246 // User can view Employee data in the Time Program Tab
PermNewMmRmEmployeeEditButtonHistory authaus.PermissionU16 = 1247 // User can edit Employee data in the Button History Tab
PermNewMmRmEmployeeViewButtonHistory authaus.PermissionU16 = 1248 // User can view Employee data in the Button History Tab
PermNewMmRmEmployeeEditAttachment authaus.PermissionU16 = 1249 // User can edit Employee data in the Attachment Tab
PermNewMmRmEmployeeViewAttachment authaus.PermissionU16 = 1250 // User can view Employee data in the Attachment Tab
PermNewMmRmEmployeeEditFitnessForDuty authaus.PermissionU16 = 1251 // User can edit Employee data in the Fitness For Duty Tab
PermNewMmRmEmployeeViewFitnessForDuty authaus.PermissionU16 = 1252 // User can view Employee data in the Fitness For Duty Tab
PermNewMmRmEmployeeEditGrievance authaus.PermissionU16 = 1253 // User can edit Employee data in the Grievance Tab
PermNewMmRmEmployeeViewGrievance authaus.PermissionU16 = 1254 // User can view Employee data in the Grievance Tab
PermNewMmRmEmployeeEditDisciplinary authaus.PermissionU16 = 1255 // User can edit Employee data in the Disciplinary Tab
PermNewMmRmEmployeeViewDisciplinary authaus.PermissionU16 = 1256 // User can view Employee data in the Disciplinary Tab
PermNewMmRmContractorsCreateAdd authaus.PermissionU16 = 1257 // User can add a new Contractor
PermNewMmRmContractorsEdit authaus.PermissionU16 = 1258 // User can edit a Contractor
PermNewMmRmContractorsView authaus.PermissionU16 = 1259 // User can view a Contractor
PermNewMmRmContractorsArchive authaus.PermissionU16 = 1260 // User can archive a Contractor
PermNewMmRmOrganogramCreateAddPosition authaus.PermissionU16 = 1261 // User can create a new position in the organogram
PermNewMmRmOrganogramEdit authaus.PermissionU16 = 1262 // User can edit an entry in the organogram
PermNewMmRmOrganogramView authaus.PermissionU16 = 1263 // User can view the Organogram
PermNewMmRmOrganogramFreese authaus.PermissionU16 = 1264 // User can freeze a position on the Organogram
PermNewMmRmOrganogramUnfreezes authaus.PermissionU16 = 1265 // User can unfreeze a position on the Organogram
PermNewMmRmOrganogramAbolish authaus.PermissionU16 = 1266 // User can abolish a position on the Organogram
PermNewMmRmStandardTimeCreateAdd authaus.PermissionU16 = 1267 // User can create a new Standard Time entry
PermNewMmRmStandardTimeEdit authaus.PermissionU16 = 1268 // User can edit a Standard Time
PermNewMmRmStandardTimeView authaus.PermissionU16 = 1269 // User can view a Standard Time
PermNewMmRmStandardTimeArchive authaus.PermissionU16 = 1270 // User can archive a Standard Time
PermNewMmRmPayDaysCreateAdd authaus.PermissionU16 = 1271 // User can create a new Pay Day entry
PermNewMmRmPayDaysEdit authaus.PermissionU16 = 1272 // User can edit a Pay Day
PermNewMmRmPayDaysView authaus.PermissionU16 = 1273 // User can view a Pay Day
PermNewMmRmPayDaysArchive authaus.PermissionU16 = 1274 // User can archive a Pay Day
PermNewMmRmPublicHolidaysCreateAdd authaus.PermissionU16 = 1275 // User can create a new Public Holiday
PermNewMmRmPublicHolidaysEdit authaus.PermissionU16 = 1276 // User can edit a Public Holiday
PermNewMmRmPublicHolidaysView authaus.PermissionU16 = 1277 // User can view a Public Holiday
PermNewMmRmPublicHolidaysArchive authaus.PermissionU16 = 1278 // User can archive a Public Holiday
PermNewMmRmLeaveManagementCreateAdd authaus.PermissionU16 = 1279 // User can create a new Leave entry
PermNewMmRmLeaveManagementEdit authaus.PermissionU16 = 1280 // User can edit a Leave entry
PermNewMmRmLeaveManagementView authaus.PermissionU16 = 1281 // User can view a Leave entry
PermNewMmRmLeaveManagementArchive authaus.PermissionU16 = 1282 // User can archive a Leave
PermNewMmRmContractCreateAdd authaus.PermissionU16 = 1283 // User can create a new Contract entry
PermNewMmRmContractEdit authaus.PermissionU16 = 1284 // User can edit a Contract
PermNewMmRmContractView authaus.PermissionU16 = 1285 // User can view a Contract
PermNewMmRmContractArchive authaus.PermissionU16 = 1286 // User can archive a Contract
PermNewMmRmAgreementsCreateAdd authaus.PermissionU16 = 1287 // User can create a new Contract Agreement
PermNewMmRmAgreementsEdit authaus.PermissionU16 = 1288 // User can edit a Contract Agreement
PermNewMmRmAgreementsView authaus.PermissionU16 = 1289 // User can view a Contract Agreement
PermNewMmRmAgreementsArchive authaus.PermissionU16 = 1290 // User can archive a Contract Agreement
PermNewMmRmPenaltiesCreateAdd authaus.PermissionU16 = 1291 // User can create a new Penalty
PermNewMmRmPenaltiesEdit authaus.PermissionU16 = 1292 // User can edit a Penalty
PermNewMmRmPenaltiesView authaus.PermissionU16 = 1293 // User can view a Penalty
PermNewMmRmPenaltiesArchive authaus.PermissionU16 = 1294 // User can archive a Penalty
PermNewMmRmReportsView authaus.PermissionU16 = 1295 // User can view the Resource Manager Reports
PermNewMmIm authaus.PermissionU16 = 1296 // User can access the Inventory Management module
PermNewMmImFleetCreateAdd authaus.PermissionU16 = 1297 // User can create a new Fleet item
PermNewMmImFleetEdit authaus.PermissionU16 = 1298 // User can edit a Fleet item
PermNewMmImFleetView authaus.PermissionU16 = 1299 // User can view a Fleet item
PermNewMmImFleetArchive authaus.PermissionU16 = 1300 // User can archive a Fleet item
PermNewMmImFleetIssue authaus.PermissionU16 = 1301 // User can issue a Fleet item
PermNewMmImEquipmentCreateAdd authaus.PermissionU16 = 1302 // User can create a new Equipment item
PermNewMmImEquipmentEdit authaus.PermissionU16 = 1303 // User can edit a Equipment item
PermNewMmImEquipmentView authaus.PermissionU16 = 1304 // User can view a Equipment item
PermNewMmImEquipmentArchive authaus.PermissionU16 = 1305 // User can archive a Equipment item
PermNewMmImEquipmentIssue authaus.PermissionU16 = 1306 // User can issue a Equipment item
PermNewMmImSapMaterialsCreateAdd authaus.PermissionU16 = 1307 // User can create a new SAP Materials item
PermNewMmImSapMaterialsEdit authaus.PermissionU16 = 1308 // User can edit a SAP Materials item
PermNewMmImSapMaterialsView authaus.PermissionU16 = 1309 // User can view a SAP Materials item
PermNewMmImSapMaterialsArchive authaus.PermissionU16 = 1310 // User can archive a SAP Materials item
PermNewMmImSapMaterialsIssue authaus.PermissionU16 = 1311 // User can issue a SAP Materials item
PermNewMmImInformalStoresCreateAdd authaus.PermissionU16 = 1312 // User can create a new Informal Store item
PermNewMmImInformalStoresEdit authaus.PermissionU16 = 1313 // User can edit a Informal Store item
PermNewMmImInformalStoresView authaus.PermissionU16 = 1314 // User can view a Informal Store item
PermNewMmImInformalStoresArchive authaus.PermissionU16 = 1315 // User can archive a Informal Store item
PermNewMmImInformalStoresIssue authaus.PermissionU16 = 1316 // User can issue a Informal Store item
PermNewMmImProducedMaterialCreateAdd authaus.PermissionU16 = 1317 // User can create a new Produced Material item
PermNewMmImProducedMaterialEdit authaus.PermissionU16 = 1318 // User can edit a Produced Material item
PermNewMmImProducedMaterialView authaus.PermissionU16 = 1319 // User can view a Produced Material item
PermNewMmImProducedMaterialArchive authaus.PermissionU16 = 1320 // User can archive a Produced Material item
PermNewMmImProducedMaterialIssue authaus.PermissionU16 = 1321 // User can issue a Produced Material item
PermNewMmImTrafficSignsCreateAdd authaus.PermissionU16 = 1322 // User can create a new Traffic Sign item
PermNewMmImTrafficSignsEdit authaus.PermissionU16 = 1323 // User can edit a Traffic Sign item
PermNewMmImTrafficSignsView authaus.PermissionU16 = 1324 // User can view a Traffic Sign item
PermNewMmImTrafficSignsArchive authaus.PermissionU16 = 1325 // User can archive a Traffic Sign item
PermNewMmImTrafficSignsIssue authaus.PermissionU16 = 1326 // User can issue a Traffic Sign item
PermNewMmImMeterCreateAddQr authaus.PermissionU16 = 1327 // User can create new Meters using QR codes
PermNewMmImMeterCreateAddSingle authaus.PermissionU16 = 1328 // User can create a new Meter
PermNewMmImMeterCreateAddBulk authaus.PermissionU16 = 1329 // User can create bulk Meters
PermNewMmImMeterEdit authaus.PermissionU16 = 1330 // User can edit a Meter
PermNewMmImMeterView authaus.PermissionU16 = 1331 // User can view a Meter
PermNewMmImMeterArchive authaus.PermissionU16 = 1332 // User can archive a Meter
PermNewMmImMeterIssue authaus.PermissionU16 = 1333 // User can issue a Meter
PermNewMmImPersonalInventoryView authaus.PermissionU16 = 1334 // User can view the Personal Inventory grid
PermNewMmImPersonalInventoryMetersReturn authaus.PermissionU16 = 1335 // User can return a meter from Personal Inventory
PermNewMmImPersonalInventoryInformalStoreReturn authaus.PermissionU16 = 1336 // User can return a informal store item from Personal Inventory
PermNewMmImPersonalInventoryTrafficSignsReturn authaus.PermissionU16 = 1337 // User can return a traffic sign from Personal Inventory
PermNewMmImPersonalInventoryProducedMaterialReturn authaus.PermissionU16 = 1338 // User can return a produced material item from Personal Inventory
PermNewMmImPersonalInventoryFleetReturn authaus.PermissionU16 = 1339 // User can return a equipment item from Personal Inventory
PermNewMmImPersonalInventoryEquipmentReturn authaus.PermissionU16 = 1340 // User can return a fleet item from Personal Inventory
PermNewMmImPersonalInventoryMetersTransfer authaus.PermissionU16 = 1341 // User can transfer a meter in Personal Inventory
PermNewMmImPersonalInventoryInformalStoreTransfer authaus.PermissionU16 = 1342 // User can transfer a informal store item in Personal Inventory
PermNewMmImPersonalInventoryTrafficSignsTransfer authaus.PermissionU16 = 1343 // User can transfer a traffic sign in Personal Inventory
PermNewMmImPersonalInventoryProducedMaterialTransfer authaus.PermissionU16 = 1344 // User can transfer a produced material item in Personal Inventory
PermNewMmImPersonalInventoryFleetTransfer authaus.PermissionU16 = 1345 // User can transfer a equipment item in Personal Inventory
PermNewMmImPersonalInventoryEquipmentTransfer authaus.PermissionU16 = 1346 // User can transfer a fleet item in Personal Inventory
PermNewMmImReportsView authaus.PermissionU16 = 1347 // User can view the Inventory Management Reports
PermNewMmClock authaus.PermissionU16 = 1348 // User can access the Clock module
PermNewMmClockEdit authaus.PermissionU16 = 1349 // User can edit a Clock entry
PermNewMmClockViewDetail authaus.PermissionU16 = 1350 // User can view a Clock entry
PermNewMmClockCreate authaus.PermissionU16 = 1351 // User can create clock times from Time Sheet
PermNewMmClockReportsView authaus.PermissionU16 = 1352 // User can view the Clock Reports
PermNewMmFi authaus.PermissionU16 = 1353 // User can access the Finance module
PermNewMmFiTariffCreateAdd authaus.PermissionU16 = 1354 // User can create a new Tariff entry
PermNewMmFiTariffEdit authaus.PermissionU16 = 1355 // User can edit a Tariff entry
PermNewMmFiTariffView authaus.PermissionU16 = 1356 // User can view a Tariff entry
PermNewMmFiTariffArchive authaus.PermissionU16 = 1357 // User can archive a Tariff entry
PermNewMmFiProjectCodesCreateAdd authaus.PermissionU16 = 1358 // User can create a new Project Code
PermNewMmFiProjectCodesEdit authaus.PermissionU16 = 1359 // User can edit a Project Code
PermNewMmFiProjectCodesView authaus.PermissionU16 = 1360 // User can view a Project Code
PermNewMmFiProjectCodesArchive authaus.PermissionU16 = 1361 // User can archive a Project Code
PermNewMmFiSapProjectCreateAdd authaus.PermissionU16 = 1362 // User can create a new SAP Project
PermNewMmFiSapProjectEdit authaus.PermissionU16 = 1363 // User can edit a SAP Project
PermNewMmFiSapProjectView authaus.PermissionU16 = 1364 // User can view a SAP Project
PermNewMmFiSapProjectArchive authaus.PermissionU16 = 1365 // User can archive a SAP Project
PermNewMmFiCostCentresCreateAdd authaus.PermissionU16 = 1366 // User can create a new Cost Centre
PermNewMmFiCostCentresEdit authaus.PermissionU16 = 1367 // User can edit a Cost Centre
PermNewMmFiCostCentresView authaus.PermissionU16 = 1368 // User can view a Cost Centre
PermNewMmFiCostCentresArchive authaus.PermissionU16 = 1369 // User can archive a Cost Centre
PermNewMmFiReportsView authaus.PermissionU16 = 1370 // User can view the Finance Reports
PermNewMmDmEdit authaus.PermissionU16 = 1371 // User can edit a Dropdown Manager entry
PermNewMmDmCreateAdd authaus.PermissionU16 = 1372 // User can add a new Dropdown Manager entry
PermNewMmDmView authaus.PermissionU16 = 1373 // User can view the Dropdown Manager module
PermNewMmDmDisable authaus.PermissionU16 = 1374 // User can disable a Dropdown Manager entry
PermNewMmSetup authaus.PermissionU16 = 1375 // User can access the Setup module
PermNewMmSetupPmFile authaus.PermissionU16 = 1376 // User can import a PM file
PermNewMmSetupIncident authaus.PermissionU16 = 1377 // User can import a SAP Incident create notification file
PermNewMmSetupClockingData authaus.PermissionU16 = 1378 // User can import Clocking Data
PermNewMmSetupExports authaus.PermissionU16 = 1379 // User can pull exports for SAP
PermNewMmDocument authaus.PermissionU16 = 1380 // User can access the Document viewer module
PermMmWaterDataFilter authaus.PermissionU16 = 1381 // User can see data in grid and dropdowns for the Water Department
PermMmRoadsDataFilter authaus.PermissionU16 = 1382 // User can see data in grid and dropdowns for the Roads and Storm Water Department
PermMmSolidWasteDataFilter authaus.PermissionU16 = 1383 // User can see data in grid and dropdowns for the Solid Waste Department
PermMmSewerDataFilter authaus.PermissionU16 = 1384 // User can see data in grid and dropdowns for the Sewer Department
PermNewMmIlDocumentsCreate authaus.PermissionU16 = 1385 // User can create a Document
PermNewMmIlDocumentsDelete authaus.PermissionU16 = 1386 // User can delete a Document
PermThemeEditorModuleAccess authaus.PermissionU16 = 2000 // User can access the theme editor module
PermThemeEditorPublisher authaus.PermissionU16 = 2001 // User can publish private themes to global themes, un-publish, edit, create, delete global themes
PermWayleaveModuleAccess authaus.PermissionU16 = 3000 // User can access the wayleave module
PermLeasingModuleAccess authaus.PermissionU16 = 10000 // User can access the Leasing module
PermLeasingLeasedInView authaus.PermissionU16 = 10001 // User can view Leased In agreements
PermLeasingLeasedInCreate authaus.PermissionU16 = 10002 // User can create Leased In agreements
PermLeasingLeasedInUpdate authaus.PermissionU16 = 10003 // User can update Leased In agreements
PermLeasingLeasedInDelete authaus.PermissionU16 = 10004 // User can delete Leased In agreements
PermLeasingLeasedInApproval authaus.PermissionU16 = 10005 // User can change the approval Leased In agreements
PermLeasingOwnerCreate authaus.PermissionU16 = 10006 // User can create an Owner in the Leasing Module
PermLeasingFacilityCreate authaus.PermissionU16 = 10007 // User can create facilities that will appear both in Leasing and in the Asset Core database
PermLeasingLeasedOutView authaus.PermissionU16 = 10008 // User can view Leased Out agreements
PermLeasingLeasedOutCreate authaus.PermissionU16 = 10009 // User can create Leased Out agreements
PermLeasingLeasedOutUpdate authaus.PermissionU16 = 10010 // User can update Leased Out agreements
PermLeasingLeasedOutDelete authaus.PermissionU16 = 10011 // User can delete Leased Out agreements
PermLeasingLeasedOutApproval authaus.PermissionU16 = 10012 // User can change the approval Leased Out agreements
PermLeasingTenantCreate authaus.PermissionU16 = 10013 // User can create a Tenant in the Leasing Module
PermLeasingFacilityConfigure authaus.PermissionU16 = 10014 // User can configure the leasing configurations of facilities, subdiving these facilities into lettable units
PermLeasingLandlordView authaus.PermissionU16 = 10015 // User can view Maintain Landlord sub-module
PermLeasingLandlordCreate authaus.PermissionU16 = 10016 // User can create a new landlord
PermLeasingLandlordUpdate authaus.PermissionU16 = 10017 // User can edit and update landlord details
PermLeasingLandlordDelete authaus.PermissionU16 = 10018 // User can delete a landlord
PermLeasingLandlordImport authaus.PermissionU16 = 10019 // User can import supplier list file
PermLeasingLeasedInCancel authaus.PermissionU16 = 10020 // User can cancel a leased in agreement
PermLeasingLeasedOutCancel authaus.PermissionU16 = 10021 // User can cancel a leased out agreement
PermLeasingOwnerView authaus.PermissionU16 = 10022 // User can view list of owners and content of a selected owner record
PermLeasingOwnerUpdate authaus.PermissionU16 = 10023 // User can update the owner record during the Manage Owner process
PermLeasingOwnerDelete authaus.PermissionU16 = 10024 // User can delete the owner record during the Manage Owner process
PermLeasingFacilityView authaus.PermissionU16 = 10025 // User can view the list of facilities and the content of a selected facility record
PermLeasingFacilityUpdate authaus.PermissionU16 = 10026 // User can update the leasing content of a facility record during the Manage Facility process
PermLeasingFacilityDelete authaus.PermissionU16 = 10027 // User can delete the leasing content of a facility record during the Manage Facility process
PermLeasingTenantView authaus.PermissionU16 = 10028 // User can view a list of tenants and be able to view the content of a selected tenant record
PermLeasingTenantUpdate authaus.PermissionU16 = 10029 // User can update a tenant record during the Manage Tenant process
PermLeasingTenantDelete authaus.PermissionU16 = 10030 // User can delete a tenant record during the Manage Tenant process
PermLeasingLookupView authaus.PermissionU16 = 10031 // User can view a list of lookups and be able to view the content of a selected lookup record
PermLeasingLookupCreate authaus.PermissionU16 = 10032 // User can create a new lookup record
PermLeasingLookupUpdate authaus.PermissionU16 = 10033 // User can update a lookup record during the Manage lookup process
PermLeasingLookupDelete authaus.PermissionU16 = 10034 // User can delete a lookup record during the Manage lookup process
PermLeasingPaymentView authaus.PermissionU16 = 10035 // User can view Payment transactions and projections.
PermLeasingPaymentCreate authaus.PermissionU16 = 10036 // User can create Payment transactions and projections.
PermLeasingPaymentUpdate authaus.PermissionU16 = 10037 // User can update Payment transactions and projections.
PermLeasingPaymentDelete authaus.PermissionU16 = 10038 // User can delete Payment transactions and projections.
PermLeasingBillingView authaus.PermissionU16 = 10039 // User can view Billing transactions and projections.
PermLeasingBillingCreate authaus.PermissionU16 = 10040 // User can create Billing transactions and projections.
PermLeasingBillingUpdate authaus.PermissionU16 = 10041 // User can update Billing transactions and projections.
PermLeasingBillingDelete authaus.PermissionU16 = 10042 // User can delete Billing transactions and projections.
)
// PermissionsTable is a map from 16-bit permission integer to string-based name (eg 1120 to watermoduleaccess)
var PermissionsTable authaus.PermissionNameTable
// PermissionModuleMap is a map from a model name (eg "Water") to the permission required to use that module (eg 1120, aka PermWaterModuleAccess)
var PermissionModuleMap map[string]authaus.PermissionU16
func init() {
PermissionsTable = authaus.PermissionNameTable{}
PermissionModuleMap = map[string]authaus.PermissionU16{}
// It is better not to include the 'zero' permission in here, otherwise it leaks
// out into things like an inverted map from permission name to permission number.
PermissionsTable[PermAdmin] = "admin" // Super-user who can control all aspects of the auth system
PermissionsTable[PermEnabled] = "enabled" // User is allowed to use the system. Without this no request is authorized
PermissionsTable[PermBulkSms] = "bulksms" // User is allowed to send SMS messages.
PermissionsTable[PermPcsSuperUser] = "pcssuperuser" // User can perform all actions in PCS}
PermissionsTable[PermPcsBudgetAddAndDelete] = "pcsbudgetaddanddelete" // User is allowed to add and delete a budget to PCS
PermissionsTable[PermPcsBudgetUpdate] = "pcsbudgetupdate" // User is allowed to update a budget in PCS
PermissionsTable[PermPcsBudgetView] = "pcsbudgetview" // User is allowed to view budgets in PCS.
PermissionsTable[PermPcsProjectAddAndDelete] = "pcsprojectaddanddelete" // User is allowed to add and delete a project to PCS
PermissionsTable[PermPcsProjectUpdate] = "pcsprojectupdate" // User is allowed to update a project in PCS
PermissionsTable[PermPcsProjectView] = "pcsprojectview" // User is allowed to view projects in PCS
PermissionsTable[PermPcsProgrammeAddAndDelete] = "pcsprogrammeaddanddelete" // User is allowed to add and delete a programme to PCS
PermissionsTable[PermPcsProgrammeUpdate] = "pcsprogrammeupdate" // User is allowed to update a programme in PCS
PermissionsTable[PermPcsProgrammeView] = "pcsprogrammeview" // User is allowed to view programmes in PCS
PermissionsTable[PermPcsLookupAddAndDelete] = "pcslookupaddanddelete" // User is allowed to add a lookup/employee/legal entity to PCS
PermissionsTable[PermPcsLookupUpdate] = "pcslookupupdate" // User is allowed to update a lookup/employee/legal entity in PCS
PermissionsTable[PermPcsLookupView] = "pcslookupview" // User is allowed to view lookup/employee/legal entity in PCS
PermissionsTable[PermPcsBudgetItemList] = "pcsbudgetitemlist" // User is allowed to view budget items in PCS
PermissionsTable[PermPcsDynamicContent] = "pcsdynamiccontent" // User is allowed to get dynamic configuration
PermissionsTable[PermPcsProjectsUnassignedView] = "pcsprojectsunassignedview" // User is allowed to view all the projects that are not assigned to programmes
PermissionsTable[PermPcsBudgetItemsAvailable] = "pcsbudgetitemsavailable" // User is allowed to view the allocatable budget items
PermissionsTable[PermPcsProjectViewAll] = "pcsprojectviewall" // User is allowed to view all projects
PermissionsTable[PermPcsProjectEditAll] = "pcsprojecteditall" // User is allowed to edit all projects
PermissionsTable[PermReportCreator] = "reportcreator" // Can create reports
PermissionsTable[PermReportViewer] = "reportviewer" // Can view reports
PermissionsTable[PermImporter] = "importer" // User is allowed to handle data imports
PermissionsTable[PermFileDrop] = "filedrop" // User is allowed to drop files onto IMQS Web
PermissionsTable[PermMm] = "mm" // MM
PermissionsTable[PermMmWorkRequestView] = "mmworkrequestview" // Work Request View
PermissionsTable[PermMmWorkRequestAddAndDelete] = "mmworkrequestaddanddelete" // Work Request Add/Delete
PermissionsTable[PermMmWorkRequestUpdate] = "mmworkrequestupdate" // Work Request Update
PermissionsTable[PermMmPmWorkRequestAddAndDelete] = "mmpmworkrequestaddanddelete" // MM Work Request Add/Delete
PermissionsTable[PermMmPmWorkRequestUpdate] = "mmpmworkrequestupdate" // MM Work Request Update
PermissionsTable[PermMmPmWorkRequestView] = "mmpmworkrequestview" // MM Work Request View
PermissionsTable[PermMmPmRegionalManagerAddAndDelete] = "mmpmregionalmanageraddanddelete" // MM Work Request Regional Manager Add/Delete
PermissionsTable[PermMmPmRegionalManagerUpdate] = "mmpmregionalmanagerupdate" // MM Work Request Regional Manager Update
PermissionsTable[PermMmPmRegionalManagerView] = "mmpmregionalmanagerview" // MM Work Request Regional Manager View
PermissionsTable[PermMmPmDivisionalManagerAddAndDelete] = "mmpmdivisionalmanageraddanddelete" // MM Work Request Divisional Manager Add/Delete
PermissionsTable[PermMmPmDivisionalManagerUpdate] = "mmpmdivisionalmanagerupdate" // MM Work Request Divisional Manager Update
PermissionsTable[PermMmPmDivisionalManagerView] = "mmpmdivisionalmanagerview" // MM Work Request Divisional Manager View
PermissionsTable[PermMmPmGeneralManagerAddAndDelete] = "mmpmgeneralmanageraddanddelete" // MM Work Request General Manager Add/Delete
PermissionsTable[PermMmPmGeneralManagerUpdate] = "mmpmgeneralmanagerupdate" // MM Work Request General Manager Update
PermissionsTable[PermMmPmGeneralManagerView] = "mmpmgeneralmanagerview" // MM Work Request General Manager View
PermissionsTable[PermMmPmRoutingDepartmentAddAndDelete] = "mmpmroutingdepartmentaddanddelete" // MM Work Request Routing Department Add/Delete
PermissionsTable[PermMmPmRoutingDepartmentUpdate] = "mmpmroutingdepartmentupdate" // MM Work Request Routing Department Update
PermissionsTable[PermMmPmRoutingDepartmentView] = "mmpmroutingdepartmentview" // MM Work Request Routing Department View
PermissionsTable[PermMmFormBuilder] = "mmformbuilder" // MM Form Builder
PermissionsTable[PermMmLookup] = "mmlookup" // MM Lookup
PermissionsTable[PermMmServiceRequest] = "mmservicerequest" // MM Service Request
PermissionsTable[PermMmSetup] = "mmsetup" // MM Setup
PermissionsTable[PermMmSuperUser] = "mmsuperuser" // MM Super User
PermissionsTable[PermMmSetupWorkFlow] = "mmsetupworkflow" // MM Setup Workflow
PermissionsTable[PermMmSetupPM] = "mmsetuppm" // MM Setup Preventative Maintenance
PermissionsTable[PermMmSetupPMSchedule] = "mmsetuppmschedule" // MM Setup Preventative Maintenance Schedule
PermissionsTable[PermMmIncidentLogger] = "mmincidentlogger" // MM Incident Logger
PermissionsTable[PermMmResourceManagerView] = "mmresourcemanagerview" // MM Resource Manager View
PermissionsTable[PermMmResourceManagerAddAndDelete] = "mmresourcemanageraddanddelete" // MM Resource Manager Add/Delete
PermissionsTable[PermMmResourceManagerUpdate] = "mmresourcemanagerupdate" // MM Resource Manager Update
PermissionsTable[PermMmTimeAndCostView] = "mmtimeandcostview" // MM Time and Cost View
PermissionsTable[PermMmTimeAndCostAddAndDelete] = "mmtimeandcostaddanddelete" // MM Time and Cost Add/Delete
PermissionsTable[PermMmTimeAndCostUpdate] = "mmtimeandcostupdate" // MM Time and Cost Update
PermissionsTable[PermMmDocuments] = "mmdocuments" // MM Documents
PermissionsTable[PermMmMeterMaintenance] = "mmmetermaintenance" // MM Meter Maintenance Map
PermissionsTable[PermMmReAssignEditOfDisabledControl] = "mmreassigneditofdisabledcontrol" // Disabled controls become active for a user with this permission
PermissionsTable[PermMmEmployeeView] = "mmemployeeview" // MM Employee View
PermissionsTable[PermMmEmployeeAddAndDelete] = "mmemployeeaddanddelete" // MM Employee Add/Delete
PermissionsTable[PermMmEmployeeUpdate] = "mmemployeeupdate" // MM Employee Update
PermissionsTable[PermMmFleetView] = "mmfleetview" // MM Fleet View
PermissionsTable[PermMmFleetAddAndDelete] = "mmfleetaddanddelete" // MM Fleet Add/Delete
PermissionsTable[PermMmFleetUpdate] = "mmfleetupdate" // MM Fleet Update
PermissionsTable[PermMmMaterialView] = "mmmaterialview" // MM Material View
PermissionsTable[PermMmMaterialAddAndDelete] = "mmmaterialaddanddelete" // MM Material Add/Delete
PermissionsTable[PermMmMaterialUpdate] = "mmmaterialupdate" // MM Material Update
PermissionsTable[PermMmContractorView] = "mmcontractorview" // MM Contractor View
PermissionsTable[PermMmContractorAddAndDelete] = "mmcontractoraddanddelete" // MM Contractor Add/Delete
PermissionsTable[PermMmContractorUpdate] = "mmcontractorupdate" // MM Contractor Update
PermissionsTable[PermMmContractorDocsView] = "mmcontractordocsview" // MM Contractor Documents View
PermissionsTable[PermMmContractorDocsAddAndDelete] = "mmcontractordocsaddanddelete" // MM Contractor Documents Add/Delete
PermissionsTable[PermMmContractorDocsUpdate] = "mmcontractordocsupdate" // MM Contractor Documents Update
PermissionsTable[PermMmStandardTimesView] = "mmstandardtimesview" // MM Standard Times View
PermissionsTable[PermMmStandardTimesAddAndDelete] = "mmstandardtimesaddanddelete" // MM Standard Times Add/Delete
PermissionsTable[PermMmStandardTimesUpdate] = "mmstandardtimesupdate" // MM Standard Times Update
PermissionsTable[PermMmTariffsView] = "mmtariffsview" // MM Tariffs View
PermissionsTable[PermMmTariffsAddAndDelete] = "mmtariffsaddanddelete" // MM Tariffs Add/Delete
PermissionsTable[PermMmTariffsUpdate] = "mmtariffsupdate" // MM Tariffs Update
PermissionsTable[PermMmIncidentLoggerView] = "mmincidentloggerview" // MM Incident Logger View
PermissionsTable[PermMmIncidentLoggerAddAndDelete] = "mmincidentloggeraddanddelete" // MM Incident Logger Add/Delete
PermissionsTable[PermMmIncidentLoggerUpdate] = "mmincidentloggerupdate" // MM Incident Logger Update
PermissionsTable[PermMmLeaveManagementView] = "mmleavemanagementview" // MM Leave Management View
PermissionsTable[PermMmLeaveManagementAddAndDelete] = "mmleavemanagementaddanddelete" // MM Leave Management Add/Delete
PermissionsTable[PermMmLeaveManagementUpdate] = "mmleavemanagementupdate" // MM Leave Management Update
PermissionsTable[PermMmProjectCodeManagementView] = "mmprojectcodemanagementview" // MM Project Code Management View
PermissionsTable[PermMmProjectCodeManagementAddAndDelete] = "mmprojectcodemanagementaddanddelete" // MM Project Code Management Add/Delete
PermissionsTable[PermMmProjectCodeManagementUpdate] = "mmprojectcodemanagementupdate" // MM Project Code Management Update
PermissionsTable[PermMmProjectSapManagementView] = "mmprojectsapmanagementview" // MM Project Sap Management View
PermissionsTable[PermMmProjectSapManagementAddAndDelete] = "mmprojectsapmanagementaddanddelete" // MM Project Sap Management Add/Delete
PermissionsTable[PermMmProjectSapManagementUpdate] = "mmprojectsapmanagementupdate" // MM Project Sap Management Update
PermissionsTable[PermWipEnabled] = "wipenabled" // User is allowed to use the WIP module
PermissionsTable[PermWipWorkflowStart] = "wipworkflowstart" // User is allowed to start a workflow
PermissionsTable[PermWipWorkflowSuspend] = "wipworkflowsuspend" // User is allowed to suspend a workflow
PermissionsTable[PermWipWorkflowDiscard] = "wipworkflowdiscard" // User is allowed to discard a workflow
PermissionsTable[PermWipProjectView] = "wipprojectview" // User is allowed to view a WIP project
PermissionsTable[PermWipProjectAdd] = "wipprojectadd" // User is allowed to add a WIP project
PermissionsTable[PermWipProjectEdit] = "wipprojectedit" // User is allowed to edit a WIP project
PermissionsTable[PermWipProjectDelete] = "wipprojectdelete" // User is allowed to delete a WIP project
PermissionsTable[PermWipComponentView] = "wipcomponentview" // User is allowed to view a WIP component
PermissionsTable[PermWipComponentAdd] = "wipcomponentadd" // User is allowed to add a WIP component
PermissionsTable[PermWipComponentEdit] = "wipcomponentedit" // User is allowed to edit a WIP component
PermissionsTable[PermWipComponentDelete] = "wipcomponentdelete" // User is allowed to delete a WIP component
PermissionsTable[PermWipActualView] = "wipactualview" // User is allowed to view a WIP actual
PermissionsTable[PermWipActualAdd] = "wipactualadd" // User is allowed to add a WIP actual
PermissionsTable[PermWipActualEdit] = "wipactualedit" // User is allowed to edit a WIP actual
PermissionsTable[PermWipActualDelete] = "wipactualdelete" // User is allowed to delete a WIP actual
PermissionsTable[PermWipBudgetView] = "wipbudgetview" // User is allowed to view a WIP budget
PermissionsTable[PermWipBudgetAdd] = "wipbudgetadd" // User is allowed to add a WIP budget
PermissionsTable[PermWipBudgetEdit] = "wipbudgetedit" // User is allowed to edit a WIP budget
PermissionsTable[PermWipBudgetDelete] = "wipbudgetdelete" // User is allowed to delete a WIP budget
PermissionsTable[PermWipCapitalize] = "wipcapitalize" // User is allowed to perform capitalization tasks
PermissionsTable[PermEnergyConfigAddAndDelete] = "energyconfigaddanddelete" // User is allowed to add and delete an energy site configuration
PermissionsTable[PermEnergyConfigUpdate] = "energyconfigupdate" // User is allowed to update an energy site configuration
PermissionsTable[PermEnergyConfigView] = "energyconfigview" // User is allowed to view an energy site configuration
PermissionsTable[PermEnergyConfigLockUnlock] = "energyconfiglockunlock" // User is allowed to lock/unlock site configuration
PermissionsTable[PermEnergyGeneratorsStartStop] = "energygeneratorsstartstop" // User is allowed to start/stop generators
PermissionsTable[PermEnergyGateUnlock] = "energygateunlock" // User is allowed to unlock gate
PermissionsTable[PermEnergySimSwitch] = "energysimswitch" // User is allowed to switch site controller SIM
PermissionsTable[PermEnergyAlarmsMute] = "energyalarmsmute" // User is allowed to mute site alarms
PermissionsTable[PermEnergyAnalogDataRefresh] = "energyanalogdatarefresh" // User is allowed to refresh analog data
PermissionsTable[PermEnergyControllerFirmwareVersionRefresh] = "energycontrollerfirmwareversionrefresh" // User is allowed to refresh controller firmware version
PermissionsTable[PermEnergyTimeSync] = "energytimesync" // User is allowed to synchronise controller clock with server
PermissionsTable[PermEnergyAlarmsAcknowledge] = "energyalarmsacknowledge" // User is allowed to acknowledge alarms
PermissionsTable[PermEnergyGateAccessFirmwareVersionRefresh] = "energygateaccessfirmwareversionrefresh" // User is allowed to refresh gate access firmware version
PermissionsTable[PermEnergySiteInfoEdit] = "energysiteinfoedit" // User is allowed to edit site info
PermissionsTable[PermEnergySitePACEdit] = "energysitepacedit" // User is allowed to edit site PAC
PermissionsTable[PermDevconProjectEdit] = "devconprojectedit" // User is allowed to edit projects
PermissionsTable[PermDevconProjectCreate] = "devconprojectcreate" // User is allowed to create new projects
PermissionsTable[PermDevconProjectDelete] = "devconprojectdelete" // User is allowed to delete projects
PermissionsTable[PermDevconProjectMerge] = "devconprojectmerge" // User is allowed to merge projects
PermissionsTable[PermDevconApplicationEdit] = "devconapplicationedit" // User is allowed to edit applications
PermissionsTable[PermDevconApplicationCreate] = "devconapplicationcreate" // User is allowed to create new applications
PermissionsTable[PermDevconApplicationDelete] = "devconapplicationdelete" // User is allowed to delete applications
PermissionsTable[PermDevconLookupEdit] = "devconlookupedit" // User is allowed to edit lookups, such as applicant and organisation
PermissionsTable[PermDevconLookupCreate] = "devconlookupcreate" // User is allowed to create new lookups
PermissionsTable[PermDevconLookupDelete] = "devconlookupdelete" // User is allowed to delete lookups
PermissionsTable[PermDevconLookupManagement] = "devconlookupmanagement" // User is allowed to access the lookup management page and manage lookups
PermissionsTable[PermDevconTemplateManagement] = "devcontemplatemanagement" // User is allowed to access the feedback template management page and update templates
PermissionsTable[PermDevconReportViewing] = "devconreportviewing" // User is allowed to view reports
PermissionsTable[PermHydroWorkOrderCreation] = "hydroworkordercreation" // User is allowed to view and use the hydrojet work order creation tool
PermissionsTable[PermWmm] = "wmm" // User is allowed to access the Meter Maintenance
PermissionsTable[PermWmmSearchEdit] = "wmmsearchedit" // User can access the Seach and Edit module
PermissionsTable[PermWmmCreateIncident] = "wmmcreateincident" // User can create an Incident
PermissionsTable[PermWmmEditMeter] = "wmmeditmeter" // User can edit a meters details
PermissionsTable[PermWmmDm] = "wmmdm" // User can access the Dropdown Manager
PermissionsTable[PermWmmDmEdit] = "wmmdmedit" // User can add, edit or delete a Dropdown item
PermissionsTable[PermWmmExport] = "wmmexport" // User can access the Export Manager
PermissionsTable[PermWmmReports] = "wmmreports" // User can access the Meter Maintenance reports
PermissionsTable[PermImqsDeveloper] = "imqsdeveloper" // IMQS Developer
PermissionsTable[PermAssetsModuleAccess] = "assetsmoduleaccess" // User is allowed to access the Assets module
PermissionsTable[PermCogtaModuleAccess] = "cogtamoduleaccess" // User is allowed to access the COGTA module
PermissionsTable[PermConditionAssessmentModuleAccess] = "conditionassessmentmoduleaccess" // User is allowed to access the Condition Assessment module
PermissionsTable[PermDocumentExplorerModuleAccess] = "documentexplorermoduleaccess" // User is allowed to access the Document Explorer module
PermissionsTable[PermElectricityModuleAccess] = "electricitymoduleaccess" // User is allowed to access the Electricity module
PermissionsTable[PermElectricityDemandModuleAccess] = "electricitydemandmoduleaccess" // User is allowed to access the Electricity Demand module
PermissionsTable[PermElectricityDemoModuleAccess] = "electricitydemomoduleaccess" // User is allowed to access the Electricity Demo module
PermissionsTable[PermEnergyModuleAccess] = "energymoduleaccess" // User is allowed to access the Energy module
PermissionsTable[PermIndigentModuleAccess] = "indigentmoduleaccess" // User is allowed to access the Indigent module
PermissionsTable[PermLandUseModuleAccess] = "landusemoduleaccess" // User is allowed to access the Land Use module
PermissionsTable[PermMaintenanceManagementModuleAccess] = "maintenancemanagementmoduleaccess" // User is allowed to access the Maintenance Management module
PermissionsTable[PermMeterMaintenanceModuleAccess] = "metermaintenancemoduleaccess" // User is allowed to access the Meter Maintenance module
PermissionsTable[PermPcsModuleAccess] = "pcsmoduleaccess" // User is allowed to access the PCS module
PermissionsTable[PermPropertiesandBuildingsModuleAccess] = "propertiesandbuildingsmoduleaccess" // User is allowed to access the Properties and Buildings module
PermissionsTable[PermRevenueEnhancementModuleAccess] = "revenueenhancementmoduleaccess" // User is allowed to access the Revenue Enhancement module
PermissionsTable[PermRoadsModuleAccess] = "roadsmoduleaccess" // User is allowed to access the Roads module
PermissionsTable[PermSewerModuleAccess] = "sewermoduleaccess" // User is allowed to access the Sewer module
PermissionsTable[PermSewerPRPModuleAccess] = "sewerprpmoduleaccess" // User is allowed to access the Sewer PRP module
PermissionsTable[PermStormwaterModuleAccess] = "stormwatermoduleaccess" // User is allowed to access the Stormwater module
PermissionsTable[PermTelcosModuleAccess] = "telcosmoduleaccess" // User is allowed to access the Telcos module
PermissionsTable[PermWaterModuleAccess] = "watermoduleaccess" // User is allowed to access the Water module
PermissionsTable[PermWaterDemandModuleAccess] = "waterdemandmoduleaccess" // User is allowed to access the Water Demand module
PermissionsTable[PermWaterPRPModuleAccess] = "waterprpmoduleaccess" // User is allowed to access the Water PRP module
PermissionsTable[PermWipModuleAccess] = "wipmoduleaccess" // User is allowed to access the WIP module
PermissionsTable[PermDevelopmentControlModuleAccess] = "developmentcontrolmoduleaccess" // User is allowed to access the Development Control module
PermissionsTable[PermRoadSignsModuleAccess] = "roadsignsmoduleaccess" // User is allowed to access the Road Signs module
PermissionsTable[PermElectricityRPModuleAccess] = "electricityrpmoduleaccess" // User is allowed to access the Electricity RP module
PermissionsTable[PermFacilitiesModuleAccess] = "facilitiesmoduleaccess" // User is allowed to access the Facilities module
PermissionsTable[PermResourceManagerModuleAccess] = "resourcemanagermoduleaccess" // User is allowed to access the Resource Manager module
PermissionsTable[PermNewMm] = "newmm" // User can access the MM module
PermissionsTable[PermNewMmIl] = "newmmil" // User can access the Incident Logger module
PermissionsTable[PermNewMmIlCreateBulkIncidents] = "newmmilcreatebulkincidents" // User can create bulk incidents
PermissionsTable[PermNewMmIlCreateAdd] = "newmmilcreateadd" // User can add a new incident
PermissionsTable[PermNewMmIlArchive] = "newmmilarchive" // User can archive an incident
PermissionsTable[PermNewMmIlEditLogRequest] = "newmmileditlogrequest" // User can edit incident in Log Request state
PermissionsTable[PermNewMmIlViewLogRequest] = "newmmilviewlogrequest" // User can view incident in Log Request state
PermissionsTable[PermNewMmIlLogRequestSubmitIncident] = "newmmillogrequestsubmitincident" // User can submit an incident
PermissionsTable[PermNewMmIlEditAllocateDepot] = "newmmileditallocatedepot" // User can edit incident in Allocate Depot state
PermissionsTable[PermNewMmIlViewAllocateDepot] = "newmmilviewallocatedepot" // User can view incident in Allocate Depot state
PermissionsTable[PermNewMmIlAllocateDepotApprove] = "newmmilallocatedepotapprove" // User can approve incident in Allocate Depot state
PermissionsTable[PermNewMmIlAllocateDepotPostpone] = "newmmilallocatedepotpostpone" // User can postpone incident in Allocate Depot state
PermissionsTable[PermNewMmIlAllocateDepotReject] = "newmmilallocatedepotreject" // User can reject incident in Allocate Depot state
PermissionsTable[PermNewMmIlEditProcessTask] = "newmmileditprocesstask" // User can edit incident in Process Task state
PermissionsTable[PermNewMmIlViewProcessTask] = "newmmilviewprocesstask" // User can view incident in Process Task state
PermissionsTable[PermNewMmIlProcessTaskPostpone] = "newmmilprocesstaskpostpone" // User can postpone incident in Process Task state
PermissionsTable[PermNewMmIlProcessTaskReject] = "newmmilprocesstaskreject" // User can reject incident in Process Task state
PermissionsTable[PermNewMmIlProcessTaskResolve] = "newmmilprocesstaskresolve" // User can resolve incident in Process Task state
PermissionsTable[PermNewMmIlProcessTaskClose] = "newmmilprocesstaskclose" // User can close incident in Process Task state
PermissionsTable[PermNewMmIlMap] = "newmmilmap" // User can view the map
PermissionsTable[PermNewMmIlLinkedRequests] = "newmmillinkedrequests" // User can view the linked requests
PermissionsTable[PermNewMmIlFollowUp] = "newmmilfollowup" // User can view the follow up incidents
PermissionsTable[PermNewMmIlAuditTrail] = "newmmilaudittrail" // User can view the Audit Trail
PermissionsTable[PermNewMmIlPrintPreview] = "newmmilprintpreview" // User can view the Print Preview
PermissionsTable[PermNewMmIlDocuments] = "newmmildocuments" // User can view the Documents
PermissionsTable[PermNewMmIlSapNotificationImportCreateAdd] = "newmmilsapnotificationimportcreateadd" // User can import SAP Notifitications
PermissionsTable[PermNewMmIlReportsView] = "newmmilreportsview" // User can view Incident Logger Reports
PermissionsTable[PermNewMmTc] = "newmmtc" // User can access the Time and Cost Module
PermissionsTable[PermNewMmTcCreateAdd] = "newmmtccreateadd" // User can create a new Time Sheet
PermissionsTable[PermNewMmTcEdit] = "newmmtcedit" // User can edit an Time Sheet
PermissionsTable[PermNewMmTcView] = "newmmtcview" // User can view a Time Sheet
PermissionsTable[PermNewMmTcArchive] = "newmmtcarchive" // User can archive a Time Sheet
PermissionsTable[PermNewMmTcTimeExports] = "newmmtctimeexports" // User can export Time Sheets
PermissionsTable[PermNewMmTcReportsView] = "newmmtcreportsview" // User can view Time and Cost Reports
PermissionsTable[PermNewMmRm] = "newmmrm" // User can access the Resource Manager Module
PermissionsTable[PermNewMmRmEmployeeCreateAddEmployee] = "newmmrmemployeecreateaddemployee" // User can add a new Employee
PermissionsTable[PermNewMmRmEmployeeView] = "newmmrmemployeeview" // User can view Employees grid and Employee data
PermissionsTable[PermNewMmRmEmployeeEdit] = "newmmrmemployeeedit" // User can edit an Employee
PermissionsTable[PermNewMmRmEmployeeArchive] = "newmmrmemployeearchive" // User can archive an Employee
PermissionsTable[PermNewMmRmEmployeeEditGeneral] = "newmmrmemployeeeditgeneral" // User can edit Employee data in the General Tab
PermissionsTable[PermNewMmRmEmployeeViewGeneral] = "newmmrmemployeeviewgeneral" // User can view Employee data in the General Tab
PermissionsTable[PermNewMmRmEmployeeEditAppointment] = "newmmrmemployeeeditappointment" // User can edit Employee data in the Appointment Tab
PermissionsTable[PermNewMmRmEmployeeViewAppointment] = "newmmrmemployeeviewappointment" // User can view Employee data in the Appointment Tab
PermissionsTable[PermNewMmRmEmployeeEditLicense] = "newmmrmemployeeeditlicense" // User can edit Employee data in the Driver’s License Tab
PermissionsTable[PermNewMmRmEmployeeViewLicense] = "newmmrmemployeeviewlicense" // User can view Employee data in the Driver’s License Tab
PermissionsTable[PermNewMmRmEmployeeEditTimeProgram] = "newmmrmemployeeedittimeprogram" // User can edit Employee data in the Time Program Tab
PermissionsTable[PermNewMmRmEmployeeViewTimeProgram] = "newmmrmemployeeviewtimeprogram" // User can view Employee data in the Time Program Tab
PermissionsTable[PermNewMmRmEmployeeEditButtonHistory] = "newmmrmemployeeeditbuttonhistory" // User can edit Employee data in the Button History Tab
PermissionsTable[PermNewMmRmEmployeeViewButtonHistory] = "newmmrmemployeeviewbuttonhistory" // User can view Employee data in the Button History Tab
PermissionsTable[PermNewMmRmEmployeeEditAttachment] = "newmmrmemployeeeditattachment" // User can edit Employee data in the Attachment Tab
PermissionsTable[PermNewMmRmEmployeeViewAttachment] = "newmmrmemployeeviewattachment" // User can view Employee data in the Attachment Tab
PermissionsTable[PermNewMmRmEmployeeEditFitnessForDuty] = "newmmrmemployeeeditfitnessforduty" // User can edit Employee data in the Fitness For Duty Tab
PermissionsTable[PermNewMmRmEmployeeViewFitnessForDuty] = "newmmrmemployeeviewfitnessforduty" // User can view Employee data in the Fitness For Duty Tab
PermissionsTable[PermNewMmRmEmployeeEditGrievance] = "newmmrmemployeeeditgrievance" // User can edit Employee data in the Grievance Tab
PermissionsTable[PermNewMmRmEmployeeViewGrievance] = "newmmrmemployeeviewgrievance" // User can view Employee data in the Grievance Tab
PermissionsTable[PermNewMmRmEmployeeEditDisciplinary] = "newmmrmemployeeeditdisciplinary" // User can edit Employee data in the Disciplinary Tab
PermissionsTable[PermNewMmRmEmployeeViewDisciplinary] = "newmmrmemployeeviewdisciplinary" // User can view Employee data in the Disciplinary Tab
PermissionsTable[PermNewMmRmContractorsCreateAdd] = "newmmrmcontractorscreateadd" // User can add a new Contractor
PermissionsTable[PermNewMmRmContractorsEdit] = "newmmrmcontractorsedit" // User can edit a Contractor
PermissionsTable[PermNewMmRmContractorsView] = "newmmrmcontractorsview" // User can view a Contractor
PermissionsTable[PermNewMmRmContractorsArchive] = "newmmrmcontractorsarchive" // User can archive a Contractor
PermissionsTable[PermNewMmRmOrganogramCreateAddPosition] = "newmmrmorganogramcreateaddposition" // User can create a new position in the organogram
PermissionsTable[PermNewMmRmOrganogramEdit] = "newmmrmorganogramedit" // User can edit an entry in the organogram
PermissionsTable[PermNewMmRmOrganogramView] = "newmmrmorganogramview" // User can view the Organogram
PermissionsTable[PermNewMmRmOrganogramFreese] = "newmmrmorganogramfreese" // User can freeze a position on the Organogram
PermissionsTable[PermNewMmRmOrganogramUnfreezes] = "newmmrmorganogramunfreezes" // User can unfreeze a position on the Organogram
PermissionsTable[PermNewMmRmOrganogramAbolish] = "newmmrmorganogramabolish" // User can abolish a position on the Organogram
PermissionsTable[PermNewMmRmStandardTimeCreateAdd] = "newmmrmstandardtimecreateadd" // User can create a new Standard Time entry
PermissionsTable[PermNewMmRmStandardTimeEdit] = "newmmrmstandardtimeedit" // User can edit a Standard Time
PermissionsTable[PermNewMmRmStandardTimeView] = "newmmrmstandardtimeview" // User can view a Standard Time
PermissionsTable[PermNewMmRmStandardTimeArchive] = "newmmrmstandardtimearchive" // User can archive a Standard Time
PermissionsTable[PermNewMmRmPayDaysCreateAdd] = "newmmrmpaydayscreateadd" // User can create a new Pay Day entry
PermissionsTable[PermNewMmRmPayDaysEdit] = "newmmrmpaydaysedit" // User can edit a Pay Day
PermissionsTable[PermNewMmRmPayDaysView] = "newmmrmpaydaysview" // User can view a Pay Day
PermissionsTable[PermNewMmRmPayDaysArchive] = "newmmrmpaydaysarchive" // User can archive a Pay Day
PermissionsTable[PermNewMmRmPublicHolidaysCreateAdd] = "newmmrmpublicholidayscreateadd" // User can create a new Public Holiday
PermissionsTable[PermNewMmRmPublicHolidaysEdit] = "newmmrmpublicholidaysedit" // User can edit a Public Holiday
PermissionsTable[PermNewMmRmPublicHolidaysView] = "newmmrmpublicholidaysview" // User can view a Public Holiday
PermissionsTable[PermNewMmRmPublicHolidaysArchive] = "newmmrmpublicholidaysarchive" // User can archive a Public Holiday
PermissionsTable[PermNewMmRmLeaveManagementCreateAdd] = "newmmrmleavemanagementcreateadd" // User can create a new Leave entry
PermissionsTable[PermNewMmRmLeaveManagementEdit] = "newmmrmleavemanagementedit" // User can edit a Leave entry
PermissionsTable[PermNewMmRmLeaveManagementView] = "newmmrmleavemanagementview" // User can view a Leave entry
PermissionsTable[PermNewMmRmLeaveManagementArchive] = "newmmrmleavemanagementarchive" // User can archive a Leave
PermissionsTable[PermNewMmRmContractCreateAdd] = "newmmrmcontractcreateadd" // User can create a new Contract entry
PermissionsTable[PermNewMmRmContractEdit] = "newmmrmcontractedit" // User can edit a Contract
PermissionsTable[PermNewMmRmContractView] = "newmmrmcontractview" // User can view a Contract
PermissionsTable[PermNewMmRmContractArchive] = "newmmrmcontractarchive" // User can archive a Contract
PermissionsTable[PermNewMmRmAgreementsCreateAdd] = "newmmrmagreementscreateadd" // User can create a new Contract Agreement
PermissionsTable[PermNewMmRmAgreementsEdit] = "newmmrmagreementsedit" // User can edit a Contract Agreement
PermissionsTable[PermNewMmRmAgreementsView] = "newmmrmagreementsview" // User can view a Contract Agreement
PermissionsTable[PermNewMmRmAgreementsArchive] = "newmmrmagreementsarchive" // User can archive a Contract Agreement
PermissionsTable[PermNewMmRmPenaltiesCreateAdd] = "newmmrmpenaltiescreateadd" // User can create a new Penalty
PermissionsTable[PermNewMmRmPenaltiesEdit] = "newmmrmpenaltiesedit" // User can edit a Penalty
PermissionsTable[PermNewMmRmPenaltiesView] = "newmmrmpenaltiesview" // User can view a Penalty
PermissionsTable[PermNewMmRmPenaltiesArchive] = "newmmrmpenaltiesarchive" // User can archive a Penalty
PermissionsTable[PermNewMmRmReportsView] = "newmmrmreportsview" // User can view the Resource Manager Reports
PermissionsTable[PermNewMmIm] = "newmmim" // User can access the Inventory Management module
PermissionsTable[PermNewMmImFleetCreateAdd] = "newmmimfleetcreateadd" // User can create a new Fleet item
PermissionsTable[PermNewMmImFleetEdit] = "newmmimfleetedit" // User can edit a Fleet item
PermissionsTable[PermNewMmImFleetView] = "newmmimfleetview" // User can view a Fleet item
PermissionsTable[PermNewMmImFleetArchive] = "newmmimfleetarchive" // User can archive a Fleet item
PermissionsTable[PermNewMmImFleetIssue] = "newmmimfleetissue" // User can issue a Fleet item
PermissionsTable[PermNewMmImEquipmentCreateAdd] = "newmmimequipmentcreateadd" // User can create a new Equipment item
PermissionsTable[PermNewMmImEquipmentEdit] = "newmmimequipmentedit" // User can edit a Equipment item
PermissionsTable[PermNewMmImEquipmentView] = "newmmimequipmentview" // User can view a Equipment item
PermissionsTable[PermNewMmImEquipmentArchive] = "newmmimequipmentarchive" // User can archive a Equipment item
PermissionsTable[PermNewMmImEquipmentIssue] = "newmmimequipmentissue" // User can issue a Equipment item
PermissionsTable[PermNewMmImSapMaterialsCreateAdd] = "newmmimsapmaterialscreateadd" // User can create a new SAP Materials item
PermissionsTable[PermNewMmImSapMaterialsEdit] = "newmmimsapmaterialsedit" // User can edit a SAP Materials item
PermissionsTable[PermNewMmImSapMaterialsView] = "newmmimsapmaterialsview" // User can view a SAP Materials item
PermissionsTable[PermNewMmImSapMaterialsArchive] = "newmmimsapmaterialsarchive" // User can archive a SAP Materials item
PermissionsTable[PermNewMmImSapMaterialsIssue] = "newmmimsapmaterialsissue" // User can issue a SAP Materials item
PermissionsTable[PermNewMmImInformalStoresCreateAdd] = "newmmiminformalstorescreateadd" // User can create a new Informal Store item
PermissionsTable[PermNewMmImInformalStoresEdit] = "newmmiminformalstoresedit" // User can edit a Informal Store item
PermissionsTable[PermNewMmImInformalStoresView] = "newmmiminformalstoresview" // User can view a Informal Store item
PermissionsTable[PermNewMmImInformalStoresArchive] = "newmmiminformalstoresarchive" // User can archive a Informal Store item
PermissionsTable[PermNewMmImInformalStoresIssue] = "newmmiminformalstoresissue" // User can issue a Informal Store item
PermissionsTable[PermNewMmImProducedMaterialCreateAdd] = "newmmimproducedmaterialcreateadd" // User can create a new Produced Material item
PermissionsTable[PermNewMmImProducedMaterialEdit] = "newmmimproducedmaterialedit" // User can edit a Produced Material item
PermissionsTable[PermNewMmImProducedMaterialView] = "newmmimproducedmaterialview" // User can view a Produced Material item
PermissionsTable[PermNewMmImProducedMaterialArchive] = "newmmimproducedmaterialarchive" // User can archive a Produced Material item
PermissionsTable[PermNewMmImProducedMaterialIssue] = "newmmimproducedmaterialissue" // User can issue a Produced Material item
PermissionsTable[PermNewMmImTrafficSignsCreateAdd] = "newmmimtrafficsignscreateadd" // User can create a new Traffic Sign item
PermissionsTable[PermNewMmImTrafficSignsEdit] = "newmmimtrafficsignsedit" // User can edit a Traffic Sign item
PermissionsTable[PermNewMmImTrafficSignsView] = "newmmimtrafficsignsview" // User can view a Traffic Sign item
PermissionsTable[PermNewMmImTrafficSignsArchive] = "newmmimtrafficsignsarchive" // User can archive a Traffic Sign item
PermissionsTable[PermNewMmImTrafficSignsIssue] = "newmmimtrafficsignsissue" // User can issue a Traffic Sign item
PermissionsTable[PermNewMmImMeterCreateAddQr] = "newmmimmetercreateaddqr" // User can create new Meters using QR codes
PermissionsTable[PermNewMmImMeterCreateAddSingle] = "newmmimmetercreateaddsingle" // User can create a new Meter
PermissionsTable[PermNewMmImMeterCreateAddBulk] = "newmmimmetercreateaddbulk" // User can create bulk Meters
PermissionsTable[PermNewMmImMeterEdit] = "newmmimmeteredit" // User can edit a Meter
PermissionsTable[PermNewMmImMeterView] = "newmmimmeterview" // User can view a Meter
PermissionsTable[PermNewMmImMeterArchive] = "newmmimmeterarchive" // User can archive a Meter
PermissionsTable[PermNewMmImMeterIssue] = "newmmimmeterissue" // User can issue a Meter
PermissionsTable[PermNewMmImPersonalInventoryView] = "newmmimpersonalinventoryview" // User can view the Personal Inventory grid
PermissionsTable[PermNewMmImPersonalInventoryMetersReturn] = "newmmimpersonalinventorymetersreturn" // User can return a meter from Personal Inventory
PermissionsTable[PermNewMmImPersonalInventoryInformalStoreReturn] = "newmmimpersonalinventoryinformalstorereturn" // User can return a informal store item from Personal Inventory
PermissionsTable[PermNewMmImPersonalInventoryTrafficSignsReturn] = "newmmimpersonalinventorytrafficsignsreturn" // User can return a traffic sign from Personal Inventory
PermissionsTable[PermNewMmImPersonalInventoryProducedMaterialReturn] = "newmmimpersonalinventoryproducedmaterialreturn" // User can return a produced material item from Personal Inventory
PermissionsTable[PermNewMmImPersonalInventoryFleetReturn] = "newmmimpersonalinventoryfleetreturn" // User can return a equipment item from Personal Inventory
PermissionsTable[PermNewMmImPersonalInventoryEquipmentReturn] = "newmmimpersonalinventoryequipmentreturn" // User can return a fleet item from Personal Inventory
PermissionsTable[PermNewMmImPersonalInventoryMetersTransfer] = "newmmimpersonalinventorymeterstransfer" // User can transfer a meter in Personal Inventory
PermissionsTable[PermNewMmImPersonalInventoryInformalStoreTransfer] = "newmmimpersonalinventoryinformalstoretransfer" // User can transfer a informal store item in Personal Inventory
PermissionsTable[PermNewMmImPersonalInventoryTrafficSignsTransfer] = "newmmimpersonalinventorytrafficsignstransfer" // User can transfer a traffic sign in Personal Inventory
PermissionsTable[PermNewMmImPersonalInventoryProducedMaterialTransfer] = "newmmimpersonalinventoryproducedmaterialtransfer" // User can transfer a produced material item in Personal Inventory
PermissionsTable[PermNewMmImPersonalInventoryFleetTransfer] = "newmmimpersonalinventoryfleettransfer" // User can transfer a equipment item in Personal Inventory
PermissionsTable[PermNewMmImPersonalInventoryEquipmentTransfer] = "newmmimpersonalinventoryequipmenttransfer" // User can transfer a fleet item in Personal Inventory
PermissionsTable[PermNewMmImReportsView] = "newmmimreportsview" // User can view the Inventory Management Reports
PermissionsTable[PermNewMmClock] = "newmmclock" // User can access the Clock module
PermissionsTable[PermNewMmClockEdit] = "newmmclockedit" // User can edit a Clock entry
PermissionsTable[PermNewMmClockViewDetail] = "newmmclockviewdetail" // User can view a Clock entry
PermissionsTable[PermNewMmClockCreate] = "newmmclockcreate" // User can create clock times from Time Sheet
PermissionsTable[PermNewMmClockReportsView] = "newmmclockreportsview" // User can view the Clock Reports
PermissionsTable[PermNewMmFi] = "newmmfi" // User can access the Finance module
PermissionsTable[PermNewMmFiTariffCreateAdd] = "newmmfitariffcreateadd" // User can create a new Tariff entry
PermissionsTable[PermNewMmFiTariffEdit] = "newmmfitariffedit" // User can edit a Tariff entry
PermissionsTable[PermNewMmFiTariffView] = "newmmfitariffview" // User can view a Tariff entry
PermissionsTable[PermNewMmFiTariffArchive] = "newmmfitariffarchive" // User can archive a Tariff entry
PermissionsTable[PermNewMmFiProjectCodesCreateAdd] = "newmmfiprojectcodescreateadd" // User can create a new Project Code
PermissionsTable[PermNewMmFiProjectCodesEdit] = "newmmfiprojectcodesedit" // User can edit a Project Code
PermissionsTable[PermNewMmFiProjectCodesView] = "newmmfiprojectcodesview" // User can view a Project Code
PermissionsTable[PermNewMmFiProjectCodesArchive] = "newmmfiprojectcodesarchive" // User can archive a Project Code
PermissionsTable[PermNewMmFiSapProjectCreateAdd] = "newmmfisapprojectcreateadd" // User can create a new SAP Project
PermissionsTable[PermNewMmFiSapProjectEdit] = "newmmfisapprojectedit" // User can edit a SAP Project
PermissionsTable[PermNewMmFiSapProjectView] = "newmmfisapprojectview" // User can view a SAP Project
PermissionsTable[PermNewMmFiSapProjectArchive] = "newmmfisapprojectarchive" // User can archive a SAP Project
PermissionsTable[PermNewMmFiCostCentresCreateAdd] = "newmmficostcentrescreateadd" // User can create a new Cost Centre
PermissionsTable[PermNewMmFiCostCentresEdit] = "newmmficostcentresedit" // User can edit a Cost Centre
PermissionsTable[PermNewMmFiCostCentresView] = "newmmficostcentresview" // User can view a Cost Centre
PermissionsTable[PermNewMmFiCostCentresArchive] = "newmmficostcentresarchive" // User can archive a Cost Centre
PermissionsTable[PermNewMmFiReportsView] = "newmmfireportsview" // User can view the Finance Reports
PermissionsTable[PermNewMmDmEdit] = "newmmdmedit" // User can edit a Dropdown Manager entry
PermissionsTable[PermNewMmDmCreateAdd] = "newmmdmcreateadd" // User can add a new Dropdown Manager entry
PermissionsTable[PermNewMmDmView] = "newmmdmview" // User can view the Dropdown Manager module
PermissionsTable[PermNewMmDmDisable] = "newmmdmdisable" // User can disable a Dropdown Manager entry
PermissionsTable[PermNewMmSetup] = "newmmsetup" // User can access the Setup module
PermissionsTable[PermNewMmSetupPmFile] = "newmmsetuppmfile" // User can import a PM file
PermissionsTable[PermNewMmSetupIncident] = "newmmsetupincident" // User can import a SAP Incident create notification file
PermissionsTable[PermNewMmSetupClockingData] = "newmmsetupclockingdata" // User can import Clocking Data
PermissionsTable[PermNewMmSetupExports] = "newmmsetupexports" // User can pull exports for SAP
PermissionsTable[PermNewMmDocument] = "newmmdocument" // User can access the Document viewer module
PermissionsTable[PermMmWaterDataFilter] = "mmwaterdatafilter" // User can see data in grid and dropdowns for the Water Department
PermissionsTable[PermMmRoadsDataFilter] = "mmroadsdatafilter" // User can see data in grid and dropdowns for the Roads and Storm Water Department
PermissionsTable[PermMmSolidWasteDataFilter] = "mmsolidwastedatafilter" // User can see data in grid and dropdowns for the Solid Waste Department
PermissionsTable[PermMmSewerDataFilter] = "mmsewerdatafilter" // User can see data in grid and dropdowns for the Sewer Department
PermissionsTable[PermNewMmIlDocumentsCreate] = "newmmildocumentscreate" // User can create a Document
PermissionsTable[PermNewMmIlDocumentsDelete] = "newmmildocumentsdelete" // User can delete a Document
PermissionsTable[PermThemeEditorModuleAccess] = "themeeditormoduleaccess" // User can access the theme editor module
PermissionsTable[PermThemeEditorPublisher] = "themeeditorpublisher" // User can publish private themes to global themes, un-publish, edit, create, delete global themes
PermissionsTable[PermWayleaveModuleAccess] = "wayleavemoduleaccess" // User can access the wayleave module
PermissionsTable[PermLeasingModuleAccess] = "leasingmoduleaccess" // User can access the Leasing module
PermissionsTable[PermLeasingLeasedInView] = "leasingleasedinview" // User can view Leased In agreements
PermissionsTable[PermLeasingLeasedInCreate] = "leasingleasedincreate" // User can create Leased In agreements
PermissionsTable[PermLeasingLeasedInUpdate] = "leasingleasedinupdate" // User can update Leased In agreements
PermissionsTable[PermLeasingLeasedInDelete] = "leasingleasedindelete" // User can delete Leased In agreements
PermissionsTable[PermLeasingLeasedInApproval] = "leasingleasedinapproval" // User can change the approval Leased In agreements
PermissionsTable[PermLeasingOwnerCreate] = "leasingownercreate" // User can create an Owner in the Leasing Module
PermissionsTable[PermLeasingFacilityCreate] = "leasingfacilitycreate" // User can create facilities that will appear both in Leasing and in the Asset Core database
PermissionsTable[PermLeasingLeasedOutView] = "leasingleasedoutview" // User can view Leased Out agreements
PermissionsTable[PermLeasingLeasedOutCreate] = "leasingleasedoutcreate" // User can create Leased Out agreements
PermissionsTable[PermLeasingLeasedOutUpdate] = "leasingleasedoutupdate" // User can update Leased Out agreements
PermissionsTable[PermLeasingLeasedOutDelete] = "leasingleasedoutdelete" // User can delete Leased Out agreements
PermissionsTable[PermLeasingLeasedOutApproval] = "leasingleasedoutapproval" // User can change the approval Leased Out agreements
PermissionsTable[PermLeasingTenantCreate] = "leasingtenantcreate" // User can create a Tenant in the Leasing Module
PermissionsTable[PermLeasingFacilityConfigure] = "leasingfacilityconfigure" // User can configure the leasing configurations of facilities, subdiving these facilities into lettable units
PermissionsTable[PermLeasingLandlordView] = "leasinglandlordview" // User can view Maintain Landlord sub-module
PermissionsTable[PermLeasingLandlordCreate] = "leasinglandlordcreate" // User can create a new landlord
PermissionsTable[PermLeasingLandlordUpdate] = "leasinglandlordupdate" // User can edit and update landlord details
PermissionsTable[PermLeasingLandlordDelete] = "leasinglandlorddelete" // User can delete a landlord
PermissionsTable[PermLeasingLandlordImport] = "leasinglandlordimport" // User can import supplier list file
PermissionsTable[PermLeasingLeasedInCancel] = "leasingleasedincancel" // User can cancel a leased in agreement
PermissionsTable[PermLeasingLeasedOutCancel] = "leasingleasedoutcancel" // User can cancel a leased out agreement
PermissionsTable[PermLeasingOwnerView] = "leasingownerview" // User can view list of owners and content of a selected owner record
PermissionsTable[PermLeasingOwnerUpdate] = "leasingownerupdate" // User can update the owner record during the Manage Owner process
PermissionsTable[PermLeasingOwnerDelete] = "leasingownerdelete" // User can delete the owner record during the Manage Owner process
PermissionsTable[PermLeasingFacilityView] = "leasingfacilityview" // User can view the list of facilities and the content of a selected facility record
PermissionsTable[PermLeasingFacilityUpdate] = "leasingfacilityupdate" // User can update the leasing content of a facility record during the Manage Facility process
PermissionsTable[PermLeasingFacilityDelete] = "leasingfacilitydelete" // User can delete the leasing content of a facility record during the Manage Facility process
PermissionsTable[PermLeasingTenantView] = "leasingtenantview" // User can view a list of tenants and be able to view the content of a selected tenant record
PermissionsTable[PermLeasingTenantUpdate] = "leasingtenantupdate" // User can update a tenant record during the Manage Tenant process
PermissionsTable[PermLeasingTenantDelete] = "leasingtenantdelete" // User can delete a tenant record during the Manage Tenant process
PermissionsTable[PermLeasingLookupView] = "leasinglookupview" // User can view a list of lookups and be able to view the content of a selected lookup record
PermissionsTable[PermLeasingLookupCreate] = "leasinglookupcreate" // User can create a new lookup record
PermissionsTable[PermLeasingLookupUpdate] = "leasinglookupupdate" // User can update a lookup record during the Manage lookup process
PermissionsTable[PermLeasingLookupDelete] = "leasinglookupdelete" // User can delete a lookup record during the Manage lookup process
PermissionsTable[PermLeasingPaymentView] = "leasingpaymentview" // User can view Payment transactions and projections.
PermissionsTable[PermLeasingPaymentCreate] = "leasingpaymentcreate" // User can create Payment transactions and projections.
PermissionsTable[PermLeasingPaymentUpdate] = "leasingpaymentupdate" // User can update Payment transactions and projections.
PermissionsTable[PermLeasingPaymentDelete] = "leasingpaymentdelete" // User can delete Payment transactions and projections.
PermissionsTable[PermLeasingBillingView] = "leasingbillingview" // User can view Billing transactions and projections.
PermissionsTable[PermLeasingBillingCreate] = "leasingbillingcreate" // User can create Billing transactions and projections.
PermissionsTable[PermLeasingBillingUpdate] = "leasingbillingupdate" // User can update Billing transactions and projections.
PermissionsTable[PermLeasingBillingDelete] = "leasingbillingdelete" // User can delete Billing transactions and projections.
PermissionModuleMap["Assets"] = PermAssetsModuleAccess
PermissionModuleMap["COGTA"] = PermCogtaModuleAccess
PermissionModuleMap["Condition Assessment"] = PermConditionAssessmentModuleAccess
PermissionModuleMap["Document Explorer"] = PermDocumentExplorerModuleAccess
PermissionModuleMap["Electricity"] = PermElectricityModuleAccess
PermissionModuleMap["Electricity Demand"] = PermElectricityDemandModuleAccess
PermissionModuleMap["Electricity Demo"] = PermElectricityDemoModuleAccess
PermissionModuleMap["Energy"] = PermEnergyModuleAccess
PermissionModuleMap["Indigent"] = PermIndigentModuleAccess
PermissionModuleMap["Land Use"] = PermLandUseModuleAccess
PermissionModuleMap["Maintenance Management"] = PermMaintenanceManagementModuleAccess
PermissionModuleMap["Meter Maintenance"] = PermMeterMaintenanceModuleAccess
PermissionModuleMap["PCS"] = PermPcsModuleAccess
PermissionModuleMap["Properties and Buildings"] = PermPropertiesandBuildingsModuleAccess
PermissionModuleMap["Revenue Enhancement"] = PermRevenueEnhancementModuleAccess
PermissionModuleMap["Roads"] = PermRoadsModuleAccess
PermissionModuleMap["Sewer"] = PermSewerModuleAccess
PermissionModuleMap["Sewer PRP"] = PermSewerPRPModuleAccess
PermissionModuleMap["Stormwater"] = PermStormwaterModuleAccess
PermissionModuleMap["Telcos"] = PermTelcosModuleAccess
PermissionModuleMap["Water"] = PermWaterModuleAccess
PermissionModuleMap["Water Demand"] = PermWaterDemandModuleAccess
PermissionModuleMap["Water PRP"] = PermWaterPRPModuleAccess
PermissionModuleMap["WIP"] = PermWipModuleAccess
PermissionModuleMap["Development Control"] = PermDevelopmentControlModuleAccess
PermissionModuleMap["Road Signs"] = PermRoadSignsModuleAccess
PermissionModuleMap["Electricity RP"] = PermElectricityRPModuleAccess
PermissionModuleMap["Facilities"] = PermFacilitiesModuleAccess
PermissionModuleMap["Resource Manager"] = PermResourceManagerModuleAccess
PermissionModuleMap["Theme Editor"] = PermThemeEditorModuleAccess
PermissionModuleMap["Wayleave"] = PermWayleaveModuleAccess
PermissionModuleMap["Leasing"] = PermLeasingModuleAccess
}