How to Implement Custom Security Roles
- Add your roles in a lower environment
- Plan a role naming schema for your custom roles for easy administration
- Date your roles by adding the creation date to the name
- Back up your roles by keeping a manual hard copy of your roles in a document
- Test your roles in a lower environment before going live with your roles
- Notify users about the change
- Add the new roles to the Production Environment and assign to users
- Follow up with the end users to ensure the roles are working correctly
caution
There are many combinations of sub-roles. You must test your roles before you use them.