Use match roles to match all securable objects, as defined in a security scenario, to security roles.
1. | Click Security management. |
2. | Click the Scenarios tab. |
3. | In the list, find and select the desired record. |
4. | Sub-task: Exact match. |
5. | You can do an exact match of security roles. As a result, only those security roles are a match that have the securable object with the required access level. |
  | Click Match roles. |
6. | Select Yes in the Match using access level information field. |
6.1 | You can also search for duties and privileges with unmatched entry points. These duties and privileges give access to the securable objects that cannot be accessed by a selected role. |
  | Click Yes in the Search for unmatched entry points? field. |
6.2 | Click OK. |
7. | Sub-task: Minimum/maximum match. |
7.1 | You can do a minimum/maximum match of security roles. As a result, only those security roles are a match that have the securable object with an access level that is in the range of the defined minimum access level and maximum access level. |
  | Click Match roles. |
7.2 | Select No in the Match using access level information field. |
7.3 | Select Yes in the Use minimum access right in match? field. |
7.4 | In the Minimum rights field, select an option. |
7.5 | Select Yes in the Use maximum access right in match? field. |
7.6 | In the Maximum rights field, select an option. |
7.7 | Click OK. |
8. | Sub-task: Analyze matches. |
8.1 | On the Roles tab, the matched security roles are shown. For each security role, the matching degree indicates to what extent the role has matching entry points. |
8.2 | In the list, find and select the desired record. |
8.3 | On the Securable objects tab, the securable objects from the security scenario are shown. You can analyze how the selected role matches to the securable objects. |
9. | Sub-task: Assign users to role. |
9.1 | If you have found a security role that matches the securable objects and required access rights, you can assign users to this security role. |
  | On the Roles tab, select a role. |
9.2 | Click Assign users to role. |
9.3 | On the Assign users to roles page, you can, for example: - Add a rule to automatically assign users to the security role. - Manually assign users to the security role. |
  |
Note: The role assignment is validated for segregation of duties violations. Note: If enhanced segregation of duties rules are enabled, the role assignment is validated against the enhanced segregation of duties rules. |
9.4 | Close the page. |
10. | Close the page. |
Related to | Notes |
---|---|
Match roles |
  |