You can use table security to manage permissions on table field level. You typically use this to delimit access to specific data. For example:
Name | Responsible | Description |
---|---|---|
Record table security |
Security administrator |
You can use table security to manage permissions on table field level. Use table security recording to define the tables and table fields for which you want to set or change permissions. After recording the fields, you can define the desired access right for each recorded field. |
Extend table security recording |
Security administrator |
You can extend an existing table security recording with additionally recorded table fields. |
Change table security recording |
Security administrator |
You can make changes to a table security recording. |
Override permissions on roles |
Security administrator |
To apply the table field permissions as defined for a table security record, you must override these permissions on the applicable roles. |
Create security audit report |
Security auditor |
You can use the security audit report to analyze permissions and permission changes that are made to recorded elements during a specific period.
You can create the report based on:
You can only create this report if Security and compliance IT audit is initialized.
|