Long time reader, first time poster, please let me know if more detail is required!
I am currently working with our Inventory Control team to cleanup unauthorized change access to several important Inventory Data forms and I'm having challenges implementing security in an effective way based on their requests. Example scenario for W4101A is as follows:
Only INVCTL role should have full access to W4101A. The idea was originally to secure W4101A at *PUBLIC and grant explicit access to INVCTL...
Read more
I am currently working with our Inventory Control team to cleanup unauthorized change access to several important Inventory Data forms and I'm having challenges implementing security in an effective way based on their requests. Example scenario for W4101A is as follows:
Only INVCTL role should have full access to W4101A. The idea was originally to secure W4101A at *PUBLIC and grant explicit access to INVCTL...
Read more