Skip to main content
Skip to main content

Getting Started

Overview

Axiom provides flexible configuration options to match your procurement team's workflows. Access control is managed through three key components that work together to define who can do what:

  1. Roles - Define user capabilities and permissions
  2. Approval Permissions - Control who can approve content changes
  3. Buyer Permissions - Control what users can view and purchase

Roles

Roles define what actions users can perform in the system. Start by identifying key roles for your organization:

  • Category managers: Onboard suppliers, manage price changes, analyze performance
  • System administrators: Manage the platform, invite users, configure permissions
  • Buyers: Purchase products, manage wish lists, access catalogues

Key Points

  • Roles can be system-defined (admin, member) or custom-created
  • Each role has specific permissions for different actions
  • Roles are team-scoped (client or supplier organizations)
  • Users can have multiple roles through direct assignment or group membership

For detailed role management, see Roles Guide.

Approval Permissions

Approval permissions control who can approve different types of content changes:

  • Price approvals - Price changes and new pricing
  • Promotion approvals - Promotional campaigns and offers

Key Points

  • Permissions are user-specific and can be assigned to groups
  • Conditions can be set for suppliers, countries, and catalogues
  • Multiple approvers are recommended for important decisions
  • System administrators typically manage these permissions

For detailed setup, see Approval Permissions Guide.

Buyer Permissions

Buyer permissions control what users can view and purchase in the marketplace:

  • Restrict View - Hide products from search results and catalogues
  • Restrict Purchase - Allow viewing but prevent purchasing
  • Restrict Purchase with Approval - Require approval before purchase

Key Points

  • Permissions can be based on products, suppliers, countries, codes, keywords, or services
  • Often used for regulatory compliance (e.g., PPE restrictions)
  • System administrators typically configure these permissions
  • Can be applied to individual users or user groups

For detailed setup, see Buyer Permissions Guide.

Interactive Guide - Searching for specific services

Interactive Guide - How to view exisiting suppliers