Example security configuration for project requests
This example describes an organization, XYZ Corporation, that has a marketing operations team, a strategic marketing team, and some miscellaneous marketers. Users create two types of projects and requests: trade shows and strategic accounts.
*
*
Security policies
The system administrators at XYZ corporation configured two security policies.
*
Marketing Ops, for members of the marketing operations team. Security for the templates is configured as follows in this policy:
*
*
*
Strategic Marketers, for senior members of the marketing staff. Security for the templates is configured as follows:
*
*
Template permissions
To set up the workflow described above, the template developers configured the templates with the following permissions.
*
The Summary tab of the Tradeshow template has the following security policy settings:
*
Security Policy Use Model: User. The user who creates the request specifies the security policy to apply to the request.
*
View Security policies: Marketing Ops., Strategic Marketers. (Any user can select the Tradeshow template.)
*
Use Security Policy: Blank. When the use model is set to User, the Use security policy field is disabled. When users create projects or requests from this template, they must specify the security policy.
*
The Summary tab of the Strategic Accounts template has the following security policy settings:
*
Security Policy Use Model: Template. The template developer sets the value in the Use security policy field.
*
View Security policies: Marketing Ops., Strategic Marketers. (Any user can select the Strategic Accounts template.)
*
Use Security Policy: Strategic Marketers. This means that the user who creates the request cannot specify the security policy for it. Instead, the requests created from this template are assigned the Strategic Marketers security policy. Then, only the senior marketers who have security roles assigned from the Strategic Marketers security policy can access the project requests and the projects created from those requests.
Example usage
Consider the following users assigned to the following security polices:
*
*
Users create requests and projects as follows:
Summary
*
*
*