1. Library
  2. User
  3. Infor Risk and Compliance User Access Monitoring Guide
  4. Requests
  5. Requests Workflow

Requests that Generate Violations

If a request violates rules, the possible scenarios are noted:

  • The Requestor and Approver mitigates violations