Chris SeguradoAug 6, 20211 minMoving Security Configurations and Assignment Between Environments To move custom security roles as well as security assignment and legal entity security role restrictions from one environment to another,...
Chris SeguradoJul 23, 20211 minSecurity Audit - Timestamp and User tracking of published security configuration adjustmentsIn case of a security audit, we would like to proof that our custom security roles are compliant with requirements. In terms of OTB...
Chris SeguradoApr 29, 20212 minBottom-up approach for security configurations - Leveraging task recordings and BPM for analysisCreate and configure a UserID with no security role assigned: (one role without security access is required for analysis) Navigate to BPM...
Chris SeguradoMar 19, 20215 minCustom Security Roles And Moving Custom Security Configurations Between EnvironmentsThroughout my career as a consultant, clients frequently brought up the requirement of using custom security configurations and moving...