Example security configuration for project requests

This example describes an organization, XYZ Corporation, that has a marketing operations team, a strategic marketing team, and some miscellaneous marketers. Users create two types of projects and requests: tradeshows and strategic accounts.

*
*
Security policies

The system administrators at XYZ corporation configured two security policies.

*
Marketing Ops, for members of the marketing operations team. Security for the templates is configured as follows in this policy:
*
*
*
Strategic Marketers, for senior members of the marketing staff. Security for the templates is configured as follows:
*
*
Template permissions

To set up the workflow described above, the template developers configured the templates with the following permissions.

*
The Summary tab of the Tradeshow template has the following security policy settings:
*
Security Policy Use Model: User. The user who creates the request specifies the security policy to apply to the request.
*
View security policy: Marketing Ops., Strategic Marketers. (Any user can select the Tradeshow template.)
*
Use security policy: Blank. When the use model is set to User, the Use security policy field is disabled. When users create projects or requests from this template, they must specify the security policy.
*
The Summary tab of the Strategic Accounts template has the following security policy settings:
*
Security Policy Use Model: Template. The template developer sets the value in the Use security policy field.
*
View security policy: Marketing Ops., Strategic Marketers. (Any user can select the Strategic Accounts template.)
*
Use security policy: Strategic Marketers. This means that the user creating the request cannot specify the security policy for it. Instead, the requests created from this template are assigned the Strategic Marketers security policy. Then, only the senior marketers who have security roles assigned from the Strategic Marketers security policy can access the project requests and the projects created from those requests.
Example usage

Consider the following users assigned to the following security polices:

*
*

Users create requests and projects as follows:

Project or request

Work steps

Tradeshow project

Junior Jim creates a tradeshow request and submits the request to Strategic Sam. Strategic Sam approves the request and sets Vendor Vinny as the owner of the project.

Strategic accounts project:

Junior Jim creates a Strategic Accounts request, SA01, providing information for the only tab he has access to, the Summary tab. The request is automatically assigned the Strategic Accounts security policy and Jim cannot change it.

Summary
*
*
*


IBM Unica Marketing Operations
 
8.5.0
For more information, see our support and community site: Customer Central