About this Guide
This guide describes the process to set up authorizations and assign permissions to an employee or employee group for various business processes (project, requisition and procurement).The Authorization and Security process helps businesses authorize data access based on a role across locations, products, or market combinations.
Assumed Knowledge
Familiarity with the business processes involved in assigning authorities and permissions that can be used to authorize the data access based on a role across locations, products, or market combinations, and general knowledge of the LN functionality will help you understand this guide.
Document summary
This table shows the chapters of this guide:
Chapter | Content |
---|---|
Introduction | Describes the purpose and the general characteristics of Authorization and Security. |
Data Authorization Framework | An overview of the Authorization and Security framework. |
Using Parameters | Describes the parameters that must be defined to enable the Authorization and Security functionality. |
Permissions | Describes the process to set up authorizations and assign permissions to the employees. |
Authorization for business processes and entities | Describes the various business processes and the assigned secondary attributes that are required for the related business documents. |
How to read this document
This document is assembled from online Help topics.
Text in italics followed by a page number represents a hyperlink to another section in this document.
Underlined terms indicate a link to a glossary definition. If you view this document online, clicking the underlined term takes you to the glossary definition at the end of this document.