Identifying Security Roles

The first step in creating user security profiles is to identify the organization's required roles. As an organization can be quite large, with many users, it makes sense to create security profiles for users who share the same security access. At the same time, it is important to distinguish the different skill levels between users with similar profiles. While both a trainee caseworker and an advanced caseworker both work with cases, there would be limitations to certain business operations that the trainee caseworker could perform. For example, a trainee caseworker is unlikely to conduct case reviews and would not be responsible for case approvals. Therefore, it is not only the primary functions that define a user role, but also the different levels of users. By organizing SIDs into a hierarchical structure, similar business processes that are shared between various users can easily be distributed without having to manually declare all of the secured elements for each user profile.