top of page
.png)
Industry Insights Newspaper

Search
1 min read
Moving Security Configurations and Assignment Between Environments
To move custom security roles as well as security assignment and legal entity security role restrictions from one environment to another,...
1 min read
Security Audit - Timestamp and User tracking of published security configuration adjustments
In case of a security audit, we would like to proof that our custom security roles are compliant with requirements. In terms of OTB...
2 min read
Bottom-up approach for security configurations - Leveraging task recordings and BPM for analysis
Create and configure a UserID with no security role assigned: (one role without security access is required for analysis) Navigate to BPM...
5 min read
Custom Security Roles And Moving Custom Security Configurations Between Environments
Throughout my career as a consultant, clients frequently brought up the requirement of using custom security configurations and moving...
bottom of page