top of page
.png)
Industry Insights Newspaper

Search
Moving Security Configurations and Assignment Between Environments
To move custom security roles as well as security assignment and legal entity security role restrictions from one environment to another,...
1 min read
Security Audit - Timestamp and User tracking of published security configuration adjustments
In case of a security audit, we would like to proof that our custom security roles are compliant with requirements. In terms of OTB...
1 min read
Bottom-up approach for security configurations - Leveraging task recordings and BPM for analysis
Create and configure a UserID with no security role assigned: (one role without security access is required for analysis) Navigate to BPM...
2 min read
Custom Security Roles And Moving Custom Security Configurations Between Environments
Throughout my career as a consultant, clients frequently brought up the requirement of using custom security configurations and moving...
5 min read
bottom of page