Planning your scope

Before starting to define security rules, you must know how to organize your CRs using attribute values. You can select one or more attributes, or attribute sets when defining read/write security. You can set read/write security for change requests, tasks, and objects. Use this procedure to determine the type of security needed.

Procedure

  1. Determine the attributes with which you want to regulate access.
  2. For each attribute, determine which groups that attribute affects.
  3. For each attribute, decide the necessary rules, for example, who can view it, who can modify it, and who can view and modify it.

Feedback