Use the information in the Role Security Reports to migrate role functional security manually.
Follow these steps:
Create and name a local configuration for the object function. Functional security configurations can be one of many functions, for example, allow users to change the asset model. Functional security configurations have a permission of Granted Permission or Denied Permission.
Note: For information about configuring the user interface, see the Administration Guide.
The Basic Information area opens.
The Role Configuration area appears.
The list of saved configurations appears.
The object configuration is assigned to the role.
|
Copyright © 2013 CA.
All rights reserved.
|
|