Get Started with Redwood for Oracle Cloud HCM Begin Now
To ensure that questions get required attention from community members and are NOT left unanswered, it’s important for the author to indicate (by selecting “Yes” or “No” when prompted) whether the question was answered. (newly added) Please note that it is also important to respond to EACH comment your question receives. Your Yes or No response ensures an accurate status for your question.
For more information, please refer to this announcement explaining best practices for getting answers to questions.
For more information, please refer to this announcement explaining best practices for getting answers to questions.
Data Access for I.T. Security Managers
Summary
I.T. needs access to do person information for verification checks.Content
Hi Guys,
Just looking to see if anyone has customised an I.T. Security Manager user role so I.T. teams can do verification checks and what would be th best way of doing this?
We currently need I.T. staff to do identity checks using the information from the 'Manage Person' screen and not have access to anything else apart from the security console.
We've tried testing with areas of responsibility, and attaching this to the IT Security Manager user role, but this seems to give a lot more access than required.
Tagged:
0