Quantcast
Channel: SCN: Message List
Viewing all articles
Browse latest Browse all 9008

Re: Security approach - Optimized way?

$
0
0

Hi Gajesh,

Thanks for the update. But please look at below:

 

Coming to the roles, in the current plant where in value authorization is used, we have 5 different composite roles, each one having 5 distinct authorization objects with same plant values though, each of these roles created for 4 tabs ( categories of various reports). For each of these composite roles, 2 single roles of Read/Write access are also present in addition to analysis object.

 

For the new plant hierarchy, there are 2 root nodes, one for division '00' and other for division '02'. All the hierarchy content seems to be same except for the divisions.

 

Regarding the attached figure of plant hierarchy, won't there be 4 roles for each division as mentioned as hierarchy has 2 divisions and 2 root nodes? All with Type of Auth '1' i.e., below sub tree node?

Your Points 2, 3 are little confusing for me, can you please explain.

 

Unfortunately, am the only resource working on this and hence would like some help.

Thanks for the patience.


Viewing all articles
Browse latest Browse all 9008

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>