About security classes and roles in Strategic Sourcing

Strategic Sourcing includes several predefined security classes that allow access to the application based on a user's access requirements. Security classes must be assigned to roles; next, you must assign actors to roles. Main steps for security setup

Security classes

The following table lists the security classes that are used for Strategic Sourcing.

Note: 

Some security classes have specific conditions that restrict access to actions. For more information on each security class, view the security class using the configuration tool.

Security class Description
AccessToAllActions_ST

Lets a user perform all actions for all menu items in the Strategic Sourcing and Contract Management modules, including all setup, spend analysis, and supplier information. All actions are also available for actors, agents, actor context, and state/province menu items.

The user cannot access sourcing event responses for sealed bids until after the event close date.

This security class is commonly only used for Administrators.

SSAwardEvent_ST Allows a user to perform the Award action against an Event response.
SSCreateEventOutput_ST Allows a user to perform the Create Output action against an Event response.
SSManagerMenu_ST Gives the manager access to event processing menu items.
SSManualApproval_ST Allows the user to do manual approval of events and awarded responses, in case this is needed to override process flow approvals.
SSProcessEvent_ST Lets a user perform all processing of events except for awarding and creation of output.
SSProcessorMenu_ST Gives the processor access to event processing menu items.
SSRunApplicationUpdates_ST Allows the user to run menu items in the application updates menu, which are mainly for upgrades and changes to the system.
SSSetup_ST Allows the administrator to fully access all sourcing setup menu items.
CMViewEvent_ST Gives a user inquiry only access to all event information, except for sealed bid information.
SSViewEvent_ST Gives a user inquiry only access to all event information, except for sealed bid information.
SCMCommonCreateSpend_ST Allows user to run actions that create spend analysis data.
SCMCommonSupplierBasicProcessing_ST Allows user to do all processing for suppliers except for vendor creation ,manual approval, and performance evaluation.
SCMCommonSupplierCreateVendor_ST Allows user to perform the create vendor action for suppliers.
SCMCommonSupplierManualApproval_ST Allows the user to do manual approval of supplier approval items, in case this is needed to override process flow approvals.
SCMCommonSupplierPerformEvaluation_ST Allows user to create and enter supplier performance evaluation.
SCMCommonSupplierProcessInvoices_ST Allows user to do final steps in supplier created invoice process.
SCMCommonSupplierVendorCompare_ST Allows user to create supplier vendor compare records and maintain them.
SCMCommonViewInformation_ST Allows user to access all records needed for selects and inquiries.
SCMCommonViewQueues_ST Allows user to access classic transaction, Email, and Process Flow queues
SCMCommonViewSpend_ST Allows a user to view all the spend analysis information,.

Roles

Actors must be assigned to a role so that users can access the application. The following is a list of delivered roles for Strategic Sourcing and Supplier Order Management.

Role Use
Admin_ST Admin is able to perform all actions within the productline (data area). This role may be viewed the same as a System Administrator. Admin may be involved in setting up role assignments, but security setup may be performed by a Security Administrator.
SourcingAdministrator_ST Performs setup and processing action not directly pertaining to event processing.
SourcingManager_ST Performs all actions pertaining to event and supplier processing.
SourcingProcessor_ST Can perform all basic processes pertaining to event processing.
SourcingViewer_ST Can inquire on all event information.
SpendAnalysisViewer_ST An additional role you may want to assign to a person who can view spend analysis results and run spend analysis load programs.

Templates for security class and role assignments

There are no specific rules regarding the assignment of security classes to roles; you can assign any class to any role you create. However, the delivered assignments of security classes to role are samples of starting points for your security implementation.

A spreadsheet detailing the delivered security role templates for all security classes and roles is available on the Lawson Knowledge Base. The document title is "Landmark Security Templates for S3 Supply Chain Applications."

Associate roles to application functions

A spreadsheet that associates the delivered security roles to application features is available on the Lawson Knowledge Base. The document title is "Procurement Roles and Associated Processes" (KB# 5447863).