7.2.2.2.4 User Security – Map Users / Groups
This section allows administrators to assign access permissions to
specific users or user groups for managing data entry operations. Mapping users with
proper authorization ensures data security and role-based access control.
- Click User Security to select the user or user groups who can perform
data entry to maintain the data in the table.
Table 7-5 User Security
Field Description Search Bar Used to find users or user groups by name. Mapped Users Displays the list of users or groups currently associated with the configuration. It lists available groups such as:
- Application Admin of Data Foundation For Banking
- Data Maintenance Admin Group
- FRC Data Analyst
- FRC Data Catalog Administrator
Add / Edit Allows administrators to assign or modify users/groups and define their roles. Delete Removes selected users/groups from the configuration. Authorize Marks the configuration as authorized, which is often a prerequisite for applying changes. Duration From / To Defines the validity period during which the user/group will have access. Note:
Only authorized users/groups can interact with data based on the mapping. Unmapped users will be restricted.