9 DGS Application Configuration

In DGS Application Configuration, the Assessment Methodology can be selected based on the required logic. The RAG Value is computed, and the Breach Status is identified. The RAG Value is computed for the threshold percentage and the amount based on the options configured to derive the Breach Status Value.

User Roles and Actions

All the users are required to be mapped to the following user groups and user roles:

Table 9-1 User Group

Group Code Group Name
DGAPPGRP DGS App Menu Group

Table 9-2 User Role

Role Code Role Name
DGAPPCONF DGS Application Conf Role
DGADMINR DG Administration