Authorization roles
An authorization role is a role that defines the user or user groups permission to access and/or work with authorization elements or objects defined in the application.
You can assign users or user groups to an authorization role that specifies permissions for any number of authorization elements. The most common permissions are Create, Read, Update, and Delete.
The permissions can vary, depending on the nature of the authorization role element. The authorization elements relate to the master data of the system.
You can set authorization roles for each type of master data to control individual users or user groups to work with that particular type of master data represented through authorization elements.
Go to Setup > Administration > Users & Security > Authorization Roles. Click New in the upper-left corner to create an authorization role.
Edit an authorization role
-
Go to Setup > Administration > Users & Security > Authorization Roles
-
Click the authorization role, or open the context menu and then select Edit.
-
Type a name for the new authorization role and choose a user or a user group to whom the authorization role should belong.
Create an authorization role
The authorization role dialog box is the same for creating and editing authorization roles.
-
Click New in the toolbar.
-
Fill in the Name, Description , Users and User groups fields.
-
Click Apply: this enables the button Authorizations in the toolbar.
-
Select the relevant permissions for the role.
-
Click OK to save your changes.
Set authorization on the menu
You can see or set specific authorizations for views in the Menu structure page in Omada Identity. You can add one or more authorization roles for a view. To do so, go to Setup > Administration > User Interface > Menu Structure.

Even in cases in which you do not have access to a menu item, you can still open the web page manually if you have the URL. This is not the case with views. See the following example for more information.
Security summary
The Security Summary shows the rights of a user or a user group and the roles to which the user or user groups belongs. You can access the security summary via the Users or User Groups. Click the relevant user or user groups, then click the Security Summary button.

The Security Summary may look similar to the Authorization dialog box when you see it at first glance, but you cannot edit anything here. The page serves as an overview of the rights and roles to which the role belongs. The sum of all the user/user group's authorization roles is listed at the bottom of the dialog box under Permissions for Special Objects. This summary is based on the authorization roles to which the role belongs. Permissions for special objects lists this role's right to create/read/update/delete users, user groups, and process templates according to Data Object Security Model (DOSM).