|
Rob In your message you stated you are moving from group profiles to authorization lists. I would ask why the change? I don’t see one method as a replacement for the other. Group profiles are best used to manage groups of profiles with that need common authority to objects. Authorization lists, work in a similarly way with other system objects. They make “groups” of objects easier to maintain by use of the authorization list. I would recommend you continue to use group profiles to manage users with similar security needs (users in a department). Use the authorization list to manage multiple objects through one management point. An example of how we use an authorization list is to manage a list of workstations that security officer profiles are authorized to sign onto. There is one authorization list that is used on all workstation devices that a security officer can sign on to. When a new security officer profile is created that user profile is entered into the authorization list. Joe Hainey
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.