You use Role Comparison to compare two or more roles in the access control application or between the application and another system. You can compare roles by Comparison Type and Comparison Level. If there is a difference between the roles, you can synchronize the roles by choosing to overwrite the values of one role with another. For more information, see below.
Role Comparison consists of the following procedures:
Selecting roles
On the Select Roles screen, choose Add, search for, and select roles. You must select at least two roles.
Selecting comparison criteria
On the Comparison Criteria screen, select the comparison level and type. If you choose to Compare roles between Access Control and System, you must select a system in the System field.
Reviewing the comparison results
On the Comparison Results screen, the results are displayed on the Actions and Permissions tab pages.
Synchronizing the roles
On the Synchronization screen, select from the following options:
Access Control to System
You are choosing to overwrite the role information on the selected system with the role information from Access Control.
System to Access Control
You are choosing to overwrite the role information in Access Control with the role information from the selected system.
Note
Synchronization is only valid if on the Comparison Criteria screen, you had selected the Type as Compare roles between Access Control and System.
For more information, see the example below.
Scheduling the job for synchronizing the roles
On the Schedule screen, enter information in the required fields to schedule the synchronization job. You can choose to run the job in the Foreground or Background.
The Confirmation screen displays your activities.
In the following example, the access control application is the role management interface for the following back-end systems: Financial (FIN) and Human Resources (HR). It illustrates that the FIN_ROLE_01 role on the FIN system does not have the same authorizations as the role in the access control application. This may occur if someone has bypassed the access control application and directly made changes to the roles on the system.
Role Comparison allows you to synchronize the roles by overwriting the role information between the access control application and the selected system.