- Data Management
- Security and Compliance Studio
- Manage security
You can monitor the changes made to and the status of the security configuration.
Activities
Name |
Responsible |
Description |
Monitor security configuration history
|
Security administrator
|
Events done on the security configuration are logged in the security history. So, you can monitor the changes to the security configuration.
These events are logged:
- Audit log initialized
- Duty created
- Duty deleted
- Duty modified
- Objects published
- Privilege created
- Privilege deleted
- Privilege modified
- Role assigned
- Role assigned dynamically
- Role created
- Role deleted
- Role locked
- Role merged
- Role modified
- Role removed
- Role removed dynamically
- Role unlocked
- Security configuration exported
- Security configuration imported
- SoD conflict allowed
- SoD conflict denied
- SoD rule created
- SoD rule deleted
- SoD rule modified
- SoD rules validated
- Stand-in role assigned
- Stand-in role removed
- Stand-in rule conflict
- Stand-in rule created
- Stand-in rule deleted
- Stand-in rules applied
- User created
- User deleted
- User disabled
- User enabled
- User modified
|
View charts
|
Security administrator
|
Several charts are available to monitor the status of the security configuration.
|