Configuring the security
Prerequisites
• Access to the Configuration > Requirement type (REQ009) menu;
• Access to the File > Requirement mapping (REQ024) menu.
Introduction
In the requirement type, it is possible to configure the security for the requirements of the type and for the type itself. Security configurations ensure that only certain users, teams, etc., have permission to view or edit records.
For example: we can define that the Documentation type will be viewed by all system users (public), but only edited by the managers.
Configuring the requirement type security
To learn how to configure the requirement type security, watch the video below:
Access types
• Team: The security list will be composed of all users that are part of a team;
• Department: The security list will be composed of users from a selected department in the organization;
• Department/Position: The security list will be composed of users from a specific department of the organization, who have a specific position;
• Position: The security list will be composed of users who hold specific positions in the organization;
• User: The list will include a specific user;
• All: The security list will be composed of all users who have access to SoftExpert Requirement.
Controls of the Requirement security tab
• Add: Allows creating requirements in this type;
• Edit: Allows editing the data of requirements of this type;
• Delete: Allows deleting the requirements of this type;
• List: Allows viewing the requirements of this type in the list of records;
• View: Allows viewing the data of requirements of this type.
Controls of the Type security tab
• Add: Allows adding new types to levels below the requirement type;
• Edit: Allows editing the type data;
• Delete: Allows deleting the type;
• Security data: Allows editing the security data of the type. Users who have this control denied, or not enabled, may change the requirement type; however, this section will be blocked.
• List: Allows viewing the type on the system screens that have type hierarchy;
• View: Allows viewing the data screen of the type.
Configuring the requirement mapping security
Requirement mapping security configurations are performed on the mapping data screen itself.
To configure the mapping security, follow the steps below:
1. Access the File > Requirement mapping (REQ024) menu.
2. Find and select the mapping whose security you want to configure.
3. Click on the button.
4. Access the Security tab.
5. Enable the Restricted option.
6. Click on .
7. Repeat the steps explained in the Configuring the security video.
Controls of the Security tab on the mapping data screen
• Add: Allows adding departments or controls to the requirement mapping;
• Edit: Allows editing the records associated with the requirement mapping (departments and/or controls);
• Delete: Allows deleting the records associated with the requirement mapping (departments and/or controls);
• List: Allows viewing the requirements of this type in the list of records;
• View: Allows viewing the mapping structure.
Conclusion
After saving, the access permissions will be applied. However, whenever needed, the security can be redefined.