Show TOC

Function documentationCritical Access Rules Locate this document in the navigation structure

 

Use this feature to identify individual roles and profiles that pose an access risk to your enterprise. For example, any person who has the role of master database administrator is a risk to your enterprise. Verify that an employee assigned to this role meets the authorization requirements for your enterprise. Make sure that you designate the role as a critical role.

If your system uses profiles, you may have defined profiles that pose an access risk. Make sure that you designate each one as a critical profile.