Use security requests to register any required changes in the security setup.

You can create a security request in these ways:
  • As a system user, you can create a security request from any page.
  • In Security and compliance studio, you can create security requests from the Security management workspace.
Usually, a security request is approved by the security manager and implemented by the security administrator.


Security administrator Security administrator Security manager Security manager Security request user Security request user Create security request from any page Create security request from any page Use security requests to register any required changes in the security setup. As a user, you can create a security request from any page. You can only do so, if the 'Security request user' role is assigned to your user setup.Usually, a security request is approved by the security manager and implemented by the security administrator. Procedure 1. Go to Accounts payable > Purchase orders > All purchase orders. 2. Click the Settings button and click My security requests. 3. Click New. 4. In the Request field, type a value. 5. In the Type field, select an option. 6. In the Area field, enter or select a value. 7. Expand the Status section. 8. In the Priority field, select an option. 9. In the Description box, enter a description of the security request. 10. Sub-task: Insert image in text. 11. On the Action Pane, click Manage. 12. Click Insert image in text. 13. You can choose an image that is already available in the Security and compliance file share workspace or upload it from a folder. To upload, click Browse, browse for and select the desired image file, and click Upload. In the list, select the desired image. Note: - To see all images that are available in the Security and compliance file share workspace, clear the Only show my images check box. - An uploaded image file is added to the images on the Security and compliance file share workspace. 14. Click OK. 15. In the Description box, click the Insert image button. In the URL field, paste the URL and click OK. 16. Sub-task: Define applicable period. 17. Expand the Details section. 18. In the Start date field, enter a date. 19. In the End date field, enter a date. 20. Sub-task: Assign security request to security manager. 21. Click Owner to open the drop dialog. 22. In the list, find and select the desired record. 23. Click OK. 24. Close the page. 25. Close the page. Start Start Create security request in Security and compliance studio Create security request in Security and compliance studio Use security requests to register any required changes in the security setup. In Security and compliance studio, you can create security requests from the Security management workspace. Usually, a security request is approved by the security manager and implemented by the security administrator. Procedure 1. Click Security management. 2. On the Requests tab, click New. 3. In the Request field, type a value. 4. In the Type field, select an option. 5. In the Origin field, select an option. 6. In the Area field, enter or select a value. 7. Expand the Status section. 8. In the Priority field, select an option. 9. In the Description box, enter a description of the security request. 10. Sub-task: Insert image in text. 11. On the Action Pane, click Manage. 12. Click Insert image in text. 13. You can choose an image that is already available in the Security and compliance file share workspace or upload it from a folder. To upload, click Browse, browse for and select the desired image file, and click Upload. In the list, select the desired image. Note: To see all images that are available in the Security and compliance file share workspace, clear the Only show my images check box. An uploaded image file is added to the images on the Security and compliance file share workspace. 14. Click OK. 15. In the Description box, click the Insert image button. In the URL field, paste the URL and click OK. 16. Sub-task: Define applicable period. 17. Expand the Details section. 18. In the Start date field, enter a date. 19. In the End date field, enter a date. 20. Sub-task: Assign security request to security manager. 21. Click Owner to open the drop dialog. 22. In the list, find and select the desired record. 23. Click OK. 24. Close the page. Notes You can also create a security request for a specific record from the Security requests FactBox on several Security management pages: Stand-in Table security recording Scenario Segregation of duties rules Users Locked security roles Approve security request Approve security request A security request usually needs approval by the security manager before it is implemented.Once approved, the security manager can assign the security request to a security administrator for implementation. Procedure 1. Click Security management. 2. In the list, find and select the desired security request. 3. Click Edit. 4. Sub-task: View related record. 5. Click Related record. 6. Close the page. 7. Sub-task: Change priority. 8. In the Priority field, select an option. 9. Sub-task: Change status to Approved. 10. Click Status. 11. Click Approved. Note: Of course, the security request can also be rejected. In this case, you can change the status to Cancelled. 12. Sub-task: Assign to security administrator. 13. Click Owner. 14. In the list, find and select the desired record. 15. Click OK. 16. Close the page. Implement security request Implement security request Once a security request is approved, it can be implemented by a security administrator. Procedure 1. Click Security management. 2. In the list, find and select the desired security request. 3. Click Edit. 4. Sub-task: View related record. 5. Click Related record. 6. Close the page. 7. Sub-task: Change status to Complete. 8. Click Status. 9. Click Complete. 10. Close the page. End End

Activities

Name Responsible Description

Create security request from any page

Security request user

Use security requests to register any required changes in the security setup. As a user, you can create a security request from any page. You can only do so, if the 'Security request user' role is assigned to your user setup.
Usually, a security request is approved by the security manager and implemented by the security administrator.

Create security request in Security and compliance studio

Security administrator

Use security requests to register any required changes in the security setup. In Security and compliance studio, you can create security requests from the Security management workspace.
Usually, a security request is approved by the security manager and implemented by the security administrator.

Approve security request

Security manager

A security request usually needs approval by the security manager before it is implemented.
Once approved, the security manager can assign the security request to a security administrator for implementation.

Implement security request

Security administrator

Once a security request is approved, it can be implemented by a security administrator.

Provide feedback