7.2.2.2.4 User Security – Map Users / Groups

This section allows administrators to assign access permissions to specific users or user groups for managing data entry operations. Mapping users with proper authorization ensures data security and role-based access control.
  1. Click User Security to select the user or user groups who can perform data entry to maintain the data in the table.

    Table 7-5 User Security

    Field Description
    Search Bar Used to find users or user groups by name.
    Mapped Users Displays the list of users or groups currently associated with the configuration.

    It lists available groups such as:

    • Application Admin of Data Foundation For Banking
    • Data Maintenance Admin Group
    • FRC Data Analyst
    • FRC Data Catalog Administrator
    Add / Edit Allows administrators to assign or modify users/groups and define their roles.
    Delete Removes selected users/groups from the configuration.
    Authorize Marks the configuration as authorized, which is often a prerequisite for applying changes.
    Duration From / To Defines the validity period during which the user/group will have access.

    Note:

    Only authorized users/groups can interact with data based on the mapping. Unmapped users will be restricted.
    For more information refer to Approving and Rejecting New Form Definitions. After approval/auto approval, the form is added to the Form Definition Summary.