Saturday, January 8, 2011

Data Security Policy - View

In this demonstration, we will see data security policy implementation and its definition.
You must log in as SYSADMIN to access the User Management responsibility
View data security policy implementation


Responsibility: User Management 
1- Click on User Management responsibility
2- Navigate to function Roles & Role Inheritance


3- Expand roles and responsibilities and then expand Security Administration. Then click on the "Update" for Customer Administrator role.


4- Click on the "User Administration privileges" link to show details for the grant defined for the set of users shown , " People in the Administrator's own Organization".


Responsibility: Functional Developer 

1- Navigate to Functional Developer Responsibility
2- In the Object page, perform a search for the object with the code UMX_PERSON_OBJECT
3- Click on the object name to view its details
4- Navigate to Object Instance Set tab subtab.
5- Click on the name "People in the Administrator's own Organization" to view the details of this object instance set.
6- Note the predicate. The SQL statement queries the set of users based upon the party relationship in TCA (the organization)




No comments:

Post a Comment