1.1 About User Access Mapping

In order to allow users to access functions in the application, Administrators must classify users and the functions they are permitted to access.

The Functions imply controlling various actionable units in the application via functional access. For example, create a case, add a customer, add an account, and so on. Users are mapped to groups, which must be mapped to specific security attributes, such as Business Domain and Jurisdiction. Groups are mapped to Roles, and Roles are mapped to Functions. Users can perform activities associated with their user group throughout the functional areas of the application. Before mapping security attributes, you must complete the following:
  1. Create users
  2. Map users to user groups
  3. Create business domain
  4. Create jurisdictions
  5. Map user groups to security attributes

Security within the Application

Security layers control how you interact with the application. Users may only access cases that are mapped to their user group. For more information about mapping users to user groups, see Provision Users.

Table 1-1 Security Details within the Application

Security Layer Type Controls Description
Roles Access to Features and Functions User roles identify which features and functions the user can access within the application.

For example, Case Analysts can access and take action on cases.

Business Domains Access to Case and Business Information You can restrict access along operational business lines and practices, such as Retail Banking. Users can only see cases that are assigned to at least one of the business domains their user group is mapped to.
Jurisdictions Access to Case Information You can restrict access using geographic locations and legal boundaries. Users can only see cases that belong to the jurisdiction their user group is mapped to.