Skip to main content
Skip table of contents

How to Implement Custom Security Roles

  • Add your roles in a lower environment

  • Plan a role naming schema for your custom roles for easy administration

  • Date your roles by adding the creation date to the name

  • Back up your roles by keeping a manual hard copy of your roles in a document

  • Test your roles in a lower environment before going live with your roles

  • Notify users about the change

  • Add the new roles to the Production Environment and assign to users

  • Follow up with the end users to ensure the roles are working correctly

There are many combinations of sub-roles. You must test your roles before you use them.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.