4.1 Using Security Mapping
The mapping of security attributes (business domain, jurisdiction, and report type) to a user (through a User Group) is done through the Security Mappings.
To define the security mappings, follow these steps:
The mapping of security attributes (business domain, jurisdiction, and report type) to a user (through a User Group) is done through the Security Mappings.
To define the security mappings, follow these steps: