User information and authorization matrices are is useful when:
- Analyzing security
- Changing roles/positions/users
- Analyzing performance
- Configuring Security
Information should include:
- Position/Transaction/Authorization/Profile/User Matrices (see examples). Which matrices you use will depend on how you want to implement security (e.g. using the Profile Generator, or not using the Profile Generator). Please see the online help for further details on how to organize user information.
- Real name, department, cost center, and other pertinent information
- Activity groups and user groups (used for security administration)
Examples of User Information Tables Authorization Matrices
The following examples are simplified and incomplete for demonstration. Additional tables should be made to show authorizations contained in each profile. User List
No comments:
Post a Comment