Configure Implicit Data Access to Requisitioning BUs for Users
SummaryHow to enable implicit data security and access to Requisitioning BUs to Users
In a recent customer post, this question was raised. This document prescribes the steps required to enable implicit data security policies to users. The key here is to note that this configuration works really well when such access is non-discretionary, i.e. the users in question must have access to the entities as a matter of policy and not by choice.
The document provides a step by step configuration for one specific example that you can then leverage to implement requirements that are specific to your organization.