Before starting to define security rules, you must know
how to organize your CRs using attribute values. You can select one
or more attributes, or attribute sets when defining read/write security.
You can set read/write security for change requests, tasks, and objects.
Use this procedure to determine the type of security needed.
Procedure
- Determine the attributes with which you want to regulate
access.
- For each attribute, determine which groups that attribute
affects.
- For each attribute, decide the necessary rules, for example,
who can view it, who can modify it, and who can view and modify it.