Show TOC

Process documentationRole Maintenance Locate this document in the navigation structure


The application provides a standardized and centralized framework to design, test, and maintain roles. The basic role maintenance process, as suggested by most system and security administrators, involves the steps described below.

Note Note

The process described below is an example. A company's process may be different, and may have more or less steps. The application allows you to customize the steps as required. For more information, see Role Creation Methodology.

End of the note.
Maintaining and Changing Role Settings

The process described below is an end-to-end process for creating roles. Once you have created a role, you can use the Go to Phase button to go directly to a stage and change the information. For example, to change the authorizations, open the role and then go to the Maintain Authorization phase.

Note Note

To edit a role, on the Business Role Management screen, you must select the role, and then choose the Open button. For some phases, such as Define Role and Maintain Authorizations, you must also choose the Edit button at the top of the phase screen.

If you select the role by choosing its name, the application displays the role in read-only mode. All the buttons are disabled and you can only view the information.

End of the note.


  • Outside the application, you have identified your business needs, and evaluated your approach for managing roles.

  • In the application, you have maintained the role methodology process and steps by:

    • Completing the activities in the Customizing activity Define Methodology Processes and Steps, under   Governance, Risk, and Compliance   Access Control   Role Management  

    • Activating the business configuration (BC) set for Role Management Methodology Process and Steps


This graphic is explained in the accompanying text.

Role Management Process