Skip to main content
Full Circle Insights



We generally install Response Management for all profiles.  You may want to exclude certain profiles from seeing elements of Response Management.  For example if you have a team of HR users who store candidate data in salesforce, we may exclude the HR profile from seeing Response Management.  

A major deliverable of the Response Management implementation is a package of reports and dashboards to help customers get started upon deployment.  We need to understand who should have access to Full Circle Response Management and Full Circle reports and dashboards upon installation

You can manage access to the application by assigning permission sets to those users who should be granted access to view all elements of the application.  For example if one of the HR profile users should see Response Management, you may grant access by assigning them the permissions set.

Permission Sets

A permission set is a collection of settings and permissions that give users access to various tools and functions. The settings and permissions in permission sets are also found in profiles, but permission sets extend users’ functional access without changing their profiles.

Full Circle Campaign Influence Configuration

This permission set allows users access to the Full Circle Campaign Influence tab in order to configure attribution models. The permission set includes tab visibility for the Full Circle Campaign Influence tab, Visualforce page access for the underlying configuration pages, and Apex class access to the Response Management Apex classes.  Assign this permission set to the select set of users that need to configure influence models.

Full Circle Response Management Permission Set

This permission set allows users to access all of the Response Management Fields, Objects, Visualforce pages and Apex classes in order to use the application and reporting features. It does NOT grant access to the Full Circle Campaign Influence Tab. This permission set does NOT grant additional administrative or system permissions.

Organizations using permission sets to grant application access should assign this permission set to existing and new users.  The alternative is to modify profiles to enable access.

  • Was this article helpful?