9 DGS Application Configuration
In DGS Application Configuration, the Assessment Methodology can be selected based on the required logic. The RAG Value is computed, and the Breach Status is identified. The RAG Value is computed for the threshold percentage and the amount based on the options configured to derive the Breach Status Value.
User Roles and Actions
All the users are required to be mapped to the following user groups and user
roles:
Table 9-1 User Group
Group Code | Group Name |
---|---|
DGAPPGRP | DGS App Menu Group |
Table 9-2 User Role
Role Code | Role Name |
---|---|
DGAPPCONF | DGS Application Conf Role |
DGADMINR | DG Administration |