Operator Profiles
Understand the different types of profiles available for operators in BMP’s Internet Banking and Apps, each designed to meet specific financial management needs.
Types of Operator Profiles
Operator profiles in BMP’s Internet Banking and mobile apps are designed to offer different levels of access and control, depending on the user’s responsibilities and needs. Each profile is carefully configured to maximize the efficiency and security of banking operations.
Profile – Account Holder
The Account Holder profile is the most comprehensive, granting the operator full authorization over all services available in Internet Banking and apps, similar to the primary account holder. This profile is ideal for trusted operators who need unrestricted access to manage all banking functionalities.
- Functionalities:
- Full authorization for transactions, including TED, PIX, and internal transfers.
- Manual registration or via CNAB file for invoices.
- Payment of invoices.
- Access to balance, receipts, and statements.
- Authorization to approve or reject transactions.
Profile – Transaction
The Transaction profile provides access to nearly all services available to the Account Holder profile, except the ability to approve financial transactions and add new operators. This profile requires authorization from the Account Holder to execute transactions, providing an intermediate level of access.
- Functionalities:
- Prior authorization required for transactions such as TED, PIX, and internal transfers.
- Manual registration or via CNAB file for invoices.
- Payment of invoices.
- Access to balance, receipts, and statements.
Profile – Inquiry
The Inquiry profile is designed for users who need to monitor the account without the ability to perform financial transactions. This profile is suitable for supervision and auditing roles.
- Functionalities:
- Manual registration or via CNAB file for invoices.
- Access to balance, receipts, and statements.
- No permission to perform TED, PIX, or internal transfers.
Conclusion
Choosing the appropriate profile depends on the specific access and control needs within your organization. By clearly understanding the capabilities of each profile, administrators can effectively assign responsibilities, ensuring that each operator has the necessary tools to perform their functions without compromising security or operational efficiency.
Was this page helpful?