Overview of Authorization and Security

The Authorization and Security functionality enables you to define the permissions (no permission, view, use, and modify) for the employees or employee groups to access data for a specific business process. The Authorization and Security process helps businesses authorize data access based on a role, rule, or company policy across locations, products, or market combinations. For example, management must be allowed to analyze all the data but employees can be authorized only to work on a subset of data.

Note: If the Authorization and Security functionality is implemented for a business process such as Project Management or Procurement, the usage of various documents are determined based on the specified permissions.

The Benefits of the functionality are:

  • Allows the company’s management to analyze all activities and results.
  • Sharing related (master) data across locations or product/ market combinations.
  • Supports centralized processes such as, planning or procurement across entities.
  • Reduces overhead by maintaining a single set of master data.

The Limitations of the functionality are:

  • This functionality is only applicable for certain processes such as Project management, Requisitions, and Procurement.
  • For example, in Project, not all Project sessions are considered for the authorization setup. See Supported Project sessions for authorization.

For authorization types and examples, see:

  • Authorization types and permission setup
  • Examples of Authorization types