Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The security entry points under the process hierarchy are critical for defining and designing the access level and privileges for any given role. Here are some of the key entry point–related functions that are supported in user security governance:
- Explode entry point
- Update permissions
Explode entry point
System administrators can expand the permissions of a given role by including all the other entry points that are related to the menu item. The menu item that is associated with the entry point is retrieved by using its name and type. The system then fetches all the other entry points that are associated with that menu item. If the menu item exists, the access rights and labels are set for the entry point. If the record type is a menu item, other properties are set, such as user licenses and manual permissions.
Important
This function adds all neighboring entry points from the selected entry point. We recommend that you use it with workspaces.
Update permissions
System administrators can update the permissions of a given role by changing the permission levels for each entry point.
For each entry point, the Unselect, Grant, or Deny permissions can be reconfigured at the following levels:
- Read
- Create
- Update
- Correct
- Invoke
- Delete