Combination of security groups - rules for application authorization

In the Security Groups application, you combine the independent security groups or the security groups that are not independent to generate a security profile for a user.

When you combine security groups, the following rules apply to application authorization:

The accumulation of all unique application authorization records across security groups becomes the access list of application authorizations in the security profile of a user.



Feedback