On this tab, it is possible to configure the security of the control type To do that, at the top of this screen, select one of the following options:
▪Public: Select this option for any user of the SE Risk to have access to the type. ▪Restricted: Select this option for only specific users of the SE Risk to have access to the type in question. At this point, the sidebar buttons will be enabled. Click on the button and fill out the fields on the screen that will be opened:
1.In the Access type field, set whether the access type that will compose the security list is: a team, a department, a department + position, a position, a user, or all users of SE Risk.
2.In the Controls field, it is possible to select the actions that may, or may not, be performed in the population type. To do so, select the controls that will be granted to access the type selected previously: ▪Add: Adds new types to levels below the control type. ▪Edit: Changes the data of the type. ▪Delete: Deletes the type. ▪Security data: Edits the security data of the type. Users who have this control denied, or not enabled, may edit the other data of the control type; however, this tab will be blocked. ▪List: Allows viewing the type on the system screens that display the control type hierarchy. Users who have this control denied, or not enabled, will not see the control type in the type hierarchy. ▪View: Views the data screen of the type.
3.Select in the Permission field, if the controls checked previously will be granted or denied for access type.
4.According to selected access type, Filters will be enabled to be filled out. Use them to facilitate the search of users who will form the security list.
5.Then, click on the button on the toolbar of the selection screen. The result will be displayed in the list of records, located in the lower part of the screen. Select those that will make up the security list and save the record. Use the SHIFT or CTRL keys on the keyboard or check next to each item to select more than one record at a time. |