Defining Security and Access
Part of an Demand Management process is the security configured for workflow steps. PPM controls permission to perform decision and execution steps using the following mechanisms:
-
Licenses. Licenses give users access to PPM products, but do not determine the specific actions a user is authorized to perform within the products.
-
Access Grants. Access grants (used with licenses) determine the actions a user can perform within a given PPM product.
For example, you can restrict what an Demand Management user can do using the following license and access grant combination:
-
License
-
Demand Management
-
-
Access Grants
-
View Requests
-
Edit Requests
-
For more information about licenses and access grants, see the Security Model Guide and Reference.
We recommend that you specify security groups or tokens (dynamic access) to set workflow security. Avoid using a list of individual users to control an action. If the user list changes (as a result of department reorganization, for example), you would have to update your workflow configuration in several places to keep the process running correctly. If you use a security group, you update the security group once, and the changes are propagated throughout the workflow. Tokens are resolved dynamically at runtime and thus adapt to the current system context as necessary.
Table 2-10. Example of workflow security groups lists example workflow steps and the security groups that have access to the workflow and each workflow step.
For more information about setting security for workflows and requests, see the Security Model Guide and Reference.
Security and User Access Checklist
Use the checklist in Table 2-11. Security and user access checklist to help determine your security and user access requirements.