1 min readMoving Security Configurations and Assignment Between Environments To move custom security roles as well as security assignment and legal entity security role restrictions from one environment to another,...
1 min readSecurity Audit - Timestamp and User tracking of published security configuration adjustmentsIn case of a security audit, we would like to proof that our custom security roles are compliant with requirements. In terms of OTB...
2 min readBottom-up approach for security configurations - Leveraging task recordings and BPM for analysisCreate and configure a UserID with no security role assigned: (one role without security access is required for analysis) Navigate to BPM...
5 min readCustom Security Roles And Moving Custom Security Configurations Between EnvironmentsThroughout my career as a consultant, clients frequently brought up the requirement of using custom security configurations and moving...