You can view the full security configuration.

This includes, for example, all:

  • Roles
  • Duties
  • Privileges
  • Entry points
  • Access rights
  • Users

For each unique combination of security elements, a separate record is shown on the page.


Standard procedure

1. Go to Security and compliance > Inquiries > Security user role data.
2. To view the security elements without identifiers, click Simple view.
3. To view the security elements with identifiers, click Advanced view.
4. Close the page.

Notes

You can export the security configuration (or a part of it) to Microsoft Excel. To do so, click Open in Microsoft Office and click the desired options to complete the export.

Provide feedback