We would really appreciate a way to set default user preferences for new system users. This would save us having to manually configure them every time we create a new user.
Enable searching by E-Mail Address and iSAMS Username
Hello In the Control Panel, navigate to User Accounts. We would like to enable searching by E-Mail Address and iSAMS Username, as currently, searching is only possible by last name!! Best Regards
Better error tracking in light of recent iSAMS total outbound email outage
We recently discovered that no emails were sent from ISAMS 27th March 11am to 10pm+ due to an ISAMS outage with IRIS/Edgen and Twilio/SendGrid. I believe all ISAMS customers were effected. There is no easy way to be alerted to this without painsta...
Create a sub-list in a global list - choosing an option presents further choices
This would be useful when logging and reporting data in lists, if one object had an associated list e.g. Student leaving reasons if Moved is selected a sub-list would open for further detail such as out of area, out of country etc. This would make...
Hello, Schools have a legal requirement to notify parents once a students attendance falls below a certain percentage. This is not currently possible in Registration or Parent Portal notification features. Please could we allow the new Automated R...
Create a method to allow iSAMS schools who don't use iSAMS Parent Portal to use the consent registers!
We don't use iSAMS Parent Portal chosing to use My School Portal instead. I would very much like to use the consent registers feature but there doesn't seem to be any way to do so if we aren't using the parent portal. If the consent registers were...
Enable granular permission to configure Manage Payment Gateways
Currently Full Access to the Control Panel is required in order to be able to configure "Manage Payment Gateways". This level of privileged access appears excessive.
Please could we be able to clone a user so we can login and see what they can? This would copy all module granular permissions as well as Security and User groups. We can safely delete this temporary user after investigation without compromising t...