1. Warehouse Devices Introduction
Warehouse devices are physical or virtual tools used to access and operate within the warehouse management system. These devices include tablets and handhelds that are registered into the system for operational use. Each device is linked to specific user activities such as scanning, inventory updates, and shipment tracking, ensuring controlled and traceable interactions within the application. Once registered, a device must be approved and verified before accessing system features, which helps maintain security and data accuracy. This process helps maintain visibility over which devices are interacting with the system and under what conditions.
Once a device is added, it undergoes an approval and verification process before it becomes active for warehouse use. Information such as device model, operating system, IP address, and location is recorded and displayed for administrative review. Devices are assigned a time-sensitive verification code, which must be regenerated if it expires. This layered process enhances security, ensures accurate tracking, and supports compliance with organizational standards for device management in warehouse environments.
- Go to Administration
- Click on Admin Settings
- Click on Warehouse Devices under Admin Settings Action
2. Key features of the Warehouse Devices tab
- Refresh Button: The Refresh button updates the list view with the most current data from the system. It is particularly useful after adding, modifying, or deleting a record to ensure it displays the latest changes.
- Select Filter Dropdown: The Select Filter dropdown helps users narrow down the list by showing only the entries they need. It offers filter choices based on preset fields like Device Id & Device Approved. This makes it easier to find the right items without scrolling through everything. It’s useful when users are looking for specific features. The filter helps save time and keeps the list focused on what's important for the task.
3. Warehouse Device tab Overview
- Device ID: This field stores the system-generated ID assigned to a device upon registration. It is used to distinguish one device from another in the backend. This ID remains constant and is critical for managing device-specific data and access control. It assists administrators in locating a specific device entry when conducting audits or troubleshooting. Although not editable, it is always visible for reference.
- Device Name: The device name is the label assigned by the user or system when the device is registered. It helps identify the device more easily in the list. The name typically corresponds to the hardware label or user-defined label visible in device settings. It can be used by administrators to quickly identify familiar devices. This field may be editable depending on system permissions.
- Device Model: This field reflects the hardware model of the device being used. It helps differentiate between different versions of devices, which is useful for compatibility checks or performance analysis. The model name is auto-detected when a new device logs in. It allows IT or support teams to anticipate behavior based on hardware type.
- Device Operating System: This field indicates the operating system the device is running. It enables system administrators to track how users are accessing the system, whether through desktop or mobile platforms. Knowing the OS type helps in optimizing support, managing updates, and applying security policies. This data is collected automatically when the device connects.
- Device Platform: This field shows the interface or access method used by the device, such as web or mobile. It gives insight into how users are interacting with the application—whether through a browser or a native app. Tracking platform usage can help prioritize development or feature testing.
- Created On: This timestamp indicates when the device was first registered with the system. It helps determine how long a device has had access. This can be useful in cases of expired devices or usage reviews. The field is read-only and recorded automatically during the registration event.
- Approved: This toggle or status label confirms whether the device is authorized to access the system. An approved device has been reviewed and granted access by an administrator. This mechanism supports secure access control by allowing only verified devices. If unchecked or pending, the device may not be able to perform certain operations.
- View Details: This is an action link or button that redirects users to a detailed view of the device entry. It may include extended information such as activity logs, user interactions, or permission levels.
- Click on View Details
- Device Info: This section provides basic data about the registered device. It includes the system-generated ID used to distinguish the device in the database. The device name is currently not populated but may appear when a label is assigned. The model indicates the hardware type, and in this case, it is shown as “Macintosh.” The platform identifies how the system is being accessed, such as through a web browser. These fields are read-only and help support teams identify the device's technical background.
- Other Info: This section captures approval and network information about the device. “Device Approved” confirms whether the device has been granted permission to access the system. The IP address is recorded to trace the network origin of the device during registration. This assists in identifying potential security concerns or network-related patterns. The “Created on” field notes the exact timestamp of when the device was first recorded in the system. All values here are auto-generated and serve as a security and audit reference.
- Location Info: This section records the geographical coordinates from where the device was registered or last accessed. If location tracking is enabled, the “Latitude” and “Longitude” values are collected automatically. These coordinates help validate access origin, especially in controlled warehouse environments.
- Verification Code: This section is dedicated to one-time device verification. A 6-digit verification code is shown, which in this case is marked as expired. The expiration ensures time-bound access and prevents unauthorized reuse. The “Generate New Verification Code” button allows administrators to refresh the code and reinitiate secure verification.
- Close Button: The "Close" button at the bottom of the window allows users to exit the device details view. Clicking this returns the user to the previous screen without making any changes.
Comments
0 comments
Please sign in to leave a comment.