Combination of security groups - rules for authorization of general ledger components

In the Security Groups application, you combine the independent security groups or the security groups that are not independent to generate a security profile.

When you combine security groups, the following rules apply to the authorization of general ledger components:

The security profile of a user lists the authorizations for general ledger components.



Feedback