Security within the Application

Security layers control how users interact with the application. The following table describes the security layers.

Table 2-1 Security Details within the Application

Security Layer Type Controls Description
Roles Access to Features and Functions User roles are used to identify which features and functions the user can access within the application. For example, Case Analysts can access and take action on cases.
Business Domains Access to Case and Business Information You can restrict access along operational business lines and practices, such as Retail Banking. Users can only see cases that are assigned to at least one of the business domains their user group is mapped to. For more information about Business Domains, see Create business domains.
Jurisdictions Access to Case Information You can restrict access using geographic locations and legal boundaries. Users can only see cases that belong to the jurisdiction their user group is mapped to. For more information about Jurisdictions, see Configuring Jurisdictions.
Case Type Access to Cases in Case Manager

Note:

Case Types are only applicable if your implementation is using Case Manager. Investigation Hub does not currently support Case Type mapping.

You can restrict access to specific types of cases. To view a case, users must be mapped to a user group which has access to view the specific Case Type assigned to the case. For more information about case types, see Configure Case Types