Map Security Roles to Business Role

The Map Security Roles to Business Role (BUSCROL) page is used to grant and remove security roles assigned to a Business Role. This is a configuration page, which is used in conjunction with the Populate Security Roles action on the User Maintenance (UDOC) transaction, to streamline the population of security roles based on business roles.

The first step is to locate the business role. Select and edit the selected business role record for which you need to assign security roles from the displayed grid. The Edit Map Security Roles to Business Role page has two tabs. The Business Role ID and Business Role Name of the selected record will appear above these tabs.

Current RolesCurrent Roles

Row-level actionsRow-level actions

Available RolesAvailable Roles

Field InformationField Information

Field

Description

Security Role ID

The unique identification of a security role.

Description

Description of a security role.

Effective From

When a role should only be delegated and not assigned permanently to a user, this date records the start of that delegation.

Effective To

When a role should only be delegated and not assigned permanently to a user, this date records the end of that delegation.

Delegate

Select Yes in this drop-down field when a role should be assigned only for a period of time and enter Effective From, Effective To, and Delegate Reason.

Delegate Reason

When a role should only be delegated and not assigned permanently to a user, this descriptive field is intended to capture the reason for it.

Row-level menuRow-level menu

Note:

  • The Business Role to Security Roles mapping is a configuration page used in conjunction with the Populate Security Roles action on the User Maintenance (UDOC) transaction. It does not independently impact security roles assigned to specific users. Any changes made to the Business Role to Security Roles mapping page are only effective on new UDOC transactions created after the change is made (changes are not automatically applied to existing users).

  • The highest precedence is given to the Map Security Roles to Business Role (BUSCROL) table while listing the security roles.

  • By using the Populate Security Roles action, an authorized user can populate the security roles in User Maintenance (UDOC), LDAP User to Business Role Association (LUSRBROL) and User to Business Role Association (USRBROLE).

  • Deleting the Business Roles will not affect the already assigned security roles via the Map Security Roles to Business Role page.