What Are Key Security Considerations for Scheduled Processes?

As part of your plan, determine the level of access individual users need to schedule processes.

Plan your custom roles accordingly so that they contain the appropriate roles and privileges to assign to specific users, depending on what they need access to.

Here are key points of access that users might need:

  • Access to the Scheduled Processes work area
  • Ability to view, update, or cancel the processes that other users submitted
  • Access to specific predefined and custom processes