4.2 User Provisioning Process Flow
The following image shows the process flow for user provisioning:
Table 4-1 User Provisioning Process Flow
Action | Description |
---|---|
Managing User Administration | Create users and map users to user groups. This allows Administrators to provide access, monitor, and administer users. |
The KYC User Groups and User Activities table describes the predefined KYC User Groups and the corresponding user activities. | Load security attributes. Security attributes are loaded using either Excel or SQL scripts. |
Mapping Security Attributes to Users | Map security attributes to users. This is done to determine which security attributes control the user’s access rights. |