You can use a security scenario to indicate all securable objects and related access levels that are required for a user to perform one or more tasks.
Name | Responsible | Description |
---|---|---|
Create security scenario |
Security administrator |
You can use a security scenario to indicate all securable objects and related access levels that are required for a user to perform one or more tasks.
This topic explains how to create a security scenario.
|
Create security scenario based on RapidValue task guide |
Security administrator |
You can use task guides, which are exported from RapidValue, to create security scenarios in the Security and compliance studio. Note: The task guides are exported from RapidValue as XML files and added to a ZIP file. When downloaded, extract the ZIP file. So, the task guide XML files can be read by the Security and compliance studio. |
Create task recording for security scenario |
Security administrator |
You can use a security scenario to indicate all securable objects and related access levels that are required for a user to perform one or more tasks.
This topic explains how to create a task recording for a security scenario and how to add the task recording to the scenario. You can create several task recordings for a security scenario.
When you save a task recording to a security scenario:
You can use the task recording steps to optimize the license cost when you create a security role. If an entry point (securable object and access level) increases the license cost, the related step can help you to decide if this access level is required or not.
|
Add existing task recording to security scenario |
Security administrator |
You can use a security scenario to indicate all securable objects and related access levels that are required for a user to perform one or more tasks.
This topic explains how to add an existing task recording to a security scenario.
You can add a task recording:
You can add several existing task recordings to a security scenario. When you add an existing task recording to a security scenario:
|
Add entry points of module menu to security scenario |
Security administrator |
You can use a security scenario to indicate all securable objects and related access levels that are required for a user to perform one or more tasks.
This topic explains how to add entry points of a module menu as securable objects to a security scenario. Each entry point in the menu of the module results in a securable object in the scenario.
You can add entry points from several modules to a security scenario. |
Manually add securable objects to security scenario |
Security administrator |
You can use a security scenario to indicate all securable objects and related access levels that are required for a user to perform one or more tasks.
This topic explains how to manually add securable objects to a security scenario.
|
Analyze security scenario and define required access levels |
Security administrator |
You can use a security scenario to indicate all securable objects and related access levels that are required for a user to perform one or more tasks.
This topic explains how to analyze the created security scenario and how to define the required access level for each securable object in the scenario.
|
Merge security scenarios |
Security administrator |
A user can have access to several business processes. To maintain this in one security scenario can be cumbersome. If so, you can maintain business process access in a separate security scenario for each business process. Before you match roles, you can merge these business process security scenarios into one security scenario. So, in match roles, all the relevant entry points are considered. |
Override permissions on roles based on security scenario |
Security administrator |
You can override the permissions of a security role based on a security scenario. You typically do this to delimit access to specific data. In a security scenario, you can indicate all securable objects and related access levels that are required for a user to perform one or more tasks. You can use this setup to override the permissions on one or more security roles. If you override permissions of a security role:
|