Use security requests to register any required changes in the security setup.
Name | Responsible | Description | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Create security request from any page |
Security request user |
Use security requests to register any required changes in the security setup. As a user, you can create a security request from any page. You can only do so, if the 'Security request user' role is assigned to your user setup. Security request typeFor each security request type, a different type-specific section is added to the Security request page. In this section, fill in or add the required type-specific information. This table shows the available security request types, for each type the related section, and a description of what to do in this section (see step 10):
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Submit security request for approval - Security request user |
Security request user |
As a security request user, you can create a security request from any page. Usually, a security request must be approved by the security manager. Once you have completed the security request creation, submit the security request for approval. How the approval process is done, depends on the setup:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Create security request in Security and compliance studio |
Security administrator |
As a security administrator, use security requests to register any required changes in the security setup. In Security and compliance studio, you can create security requests from the Security management workspace. Security request typeFor each security request type, a different type-specific section is added to the Security request page. In this section, fill in or add the required type-specific information. This table shows the available security request types, for each type the related section, and a description of what to do in this section (see step 9):
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Submit security request for approval - Security administrator |
Security administrator |
As a security administrator, you can create a security request from the Security management workspace. Usually, a security request is approved by the security manager. Once you have completed the security request creation, submit the security request for approval. How the approval process is done, depends on the setup:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Approve security request |
Security manager |
Usually, a security manager must approve the security request before it is implemented.
How the approval process is done, depends on the setup:
When you review the security request, on the Security requests page, on the Action Pane, on the Requests tab, you can:
Once approved, the security request is implemented automatically. If dynamic snapshots are enabled, the implemented security configuration changes are updated automatically in the latest snapshot. |
Name | Responsible | Description | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Create security request from any page |
Security request user |
Use security requests to register any required changes in the security setup. As a user, you can create a security request from any page. You can only do so, if the 'Security request user' role is assigned to your user setup. Security request typeFor each security request type, a different type-specific section is added to the Security request page. In this section, fill in or add the required type-specific information. This table shows the available security request types, for each type the related section, and a description of what to do in this section (see step 10):
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Submit security request for approval - Security request user |
Security request user |
As a security request user, you can create a security request from any page. Usually, a security request must be approved by the security manager. Once you have completed the security request creation, submit the security request for approval. How the approval process is done, depends on the setup:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Create security request in Security and compliance studio |
Security administrator |
As a security administrator, use security requests to register any required changes in the security setup. In Security and compliance studio, you can create security requests from the Security management workspace. Security request typeFor each security request type, a different type-specific section is added to the Security request page. In this section, fill in or add the required type-specific information. This table shows the available security request types, for each type the related section, and a description of what to do in this section (see step 9):
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Submit security request for approval - Security administrator |
Security administrator |
As a security administrator, you can create a security request from the Security management workspace. Usually, a security request is approved by the security manager. Once you have completed the security request creation, submit the security request for approval. How the approval process is done, depends on the setup:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Approve security request |
Security manager |
Usually, a security manager must approve the security request before it is implemented.
How the approval process is done, depends on the setup:
When you review the security request, on the Security requests page, on the Action Pane, on the Requests tab, you can:
Once approved, the security request is implemented automatically. If dynamic snapshots are enabled, the implemented security configuration changes are updated automatically in the latest snapshot. |
Related to | Notes |
---|---|
Manage security requests |
  |