Session 10 - Configurable Security Part 1
Session 10 - Configurable Security Part 1
Agenda
In security
• Tasks
• Reports (delivered and custom)
• Related actions
Roles
Process-
In business processes Administrative Organization Job maintained
• Initiation
• Enrichment
• Routing Access
• To-do’s and checklists
• Approve, cancel, rescind.. Reports & Tasks Business Processes
• View process details
User-based security groups can access the whole organization for a functional area
Role-based security groups can access one or more organizational units for a functional area
Examples of Process-Maintained
Security Groups:
All Employees
All Users
All Contingent Workers
Self Service Groups
Role:
The challenge
Employee
• HR function is split
• Headcount and job parity is managed by function
(supervisory organization) Intersection
Security
• Personal information, regulatory reporting, compensation is Supervisory
managed by geographic region (location hierarchy) Organizatio Location:
n: Thailand
Supervisory Orgs Pharma
Location Hierarchy
• Staffing transactions that result in job changes impact both
• The HR Partner for such transactions has to have expertise
in both the business unit and the geographic location Philippine
Pharma Consumer MD &D Thailand Taiwan
s
HR Functional HR Geographic
Partners: Partners:
Adrianne Adrianne
Kathy Carlos
Ralf Juanita
Copyright © 2013 Deloitte Development LLC. All rights reserved. 15
Security Groups – Delivered Groups User-based
Group
Role-based
Aggregation Group
(Un)Constrained
Job-based
Group
Integration
They are… System
(Un)Constrained
Intersection Group
Group
Based on a process such as hire or terminate Organization
Membership
Group
Assigned to a user (could be system, worker, non-worker) Segment
There is a version for self-service (..as Self) and, where Delivered Group
Payroll
This is an example of the Domain Security Policy for the Functional Area of Compensation.
Security Groups can be granted View or Modify access to each Domain and Sub Domain.
Functional Area
Functional Area
Business Processes
Securable Permission
(Initiate)
Example:
2/15/2009
6/22/2009