Secure Access to Changes

To secure a change order (or change request) from unauthorized access, you can add the users or roles who should have access to it.

To add users or roles:

  • Click the Security tab in a change order.

  • From Actions, click Add.

Note:
  • If you're unable to add users, you must review privileges assigned to your role or create a data security policy for change orders. For more information, see related topics.
  • You can also secure extensible flexfields appearing on the change order. For more information see the related topics.

Users in the Product Development and Product Information Management work area can view and approve change orders, whereas users in the supplier organization can only view and publish change orders.

Here are some things you need to know about a new change order:

  • Until you restrict access, change orders can be accessed by all users including supplier portal users.

  • If a new user or group is added to restrict access, the change order creator and assignee are added automatically.

  • To remove the creator and assignee, use the Delete All option.

To enable users to view or approve change orders, an administrator must also provide the necessary privileges.

When you search for a change order using any criteria, the search results show only the change orders that you're allowed to view.

Track Modifications Made to the Security Tab

You can track modifications made to the Security tab of a change order (or change request) by using the View Item Audit Trail report. Use the report to see who added or deleted entries in the list of users and roles.

  1. From the Tasks panel tab, click View Item Audit Trail.

  2. On the Audit Reports page, select the search criteria:

    • In Product, select Product Hub.

    • In Business Object Type, select Change Object Security.

    • Click Search.

You can also use the History tab on a change to audit edits made to a change. For more information, see the related topic on change history.