The security matrix
A security matrix is a mapping between users and profiles. We use a security matrix as the first step to defining what kind of restriction rule will be created and to whom it should be assigned. This is one of the best practices because it will give a single place to document and manage the security profiles.
We can have only one security matrix mapping that shows the relationship between users and profiles or we can even make it more detailed by breaking this relationship into two matrices. The first one will show the mapping between profiles and restriction rules, while the other one will show the relation between the users and profiles.
The following is a sample security matrix:
User/Profile |
Profile # 1 |
Profile # 2 |
Profile # 3 |
---|---|---|---|
User # 1 |
X | ||
Group # 1 |
X |
X | |
User # 2 |
X |
In the following table, we can see the security setting assigned to each profile:
Security setting/Profile |
Profile # 1 |
Profile # 2 |
Profile # 3 |
---|---|---|---|
Replace table |