Show TOC

Function documentationCritical Roles and Critical Profiles Locate this document in the navigation structure

 

Use these features to identify individual roles and profiles that pose a risk to your company. For example, any person who has the role of master database administrator is a risk to your enterprise.

Ensure that an employee assigned to this role has been properly authorized. Make sure that you designate the role as a critical role.

If your system uses profiles, you may have defined profiles that pose a risk. Make sure that you designate each one as a critical profile.