Prerequisites

Before you can use the components for a persona, your security administrator must:

  1. Create a role, or use an existing role, for the personas.

  2. Associate the persona components to the role, such as associating the queries and watchlists to the role.

  3. Assign you to the role to which the persona objects were associated.

See "Provisioning User and Role Profiles" and "Managing Security for User Defined Objects" in the JD Edwards EnterpriseOne Tools Security Administration Guide.