Sentinel Help Center
  • Sentinel Overview
    • Dashboard
    • Environments
    • User Hub
    • Requests
    • Reports
  • Installation & Updates
    • Sentinel Shortcuts [From PS]
    • Sentinel VM Requirements
    • Host Server Setup RHEL/CentOS 8
    • Host Server Setup RHEL/CentOS 9
    • Sentinel Server Update
    • Oracle Database Account
    • PostgreSQL Backups
  • Settings
    • Sentinel Accounts
    • Databases
    • System Settings
    • Single Sign-On
    • Access Request Settings
    • Role Groups
    • Role Approvers
    • Custom Forms
    • Sensitive Data Settings
    • Security Log
  • Security Administration
    • Menu Functions
    • Direct Access
    • Users
      • User Access Updates
      • User Profile Features
    • Roles
      • Role Updates
      • Role Features
    • Permission Lists
      • Permission List Updates
      • Permission List Features
    • Dynamic Security
    • Temporary Access
    • Fluid Security
    • Security Matrix
    • Compare Reports
  • Security Reports
    • Security Reports Setup
    • Page Analysis
    • User Access
    • Role Access
    • Permission List Access
    • Query Analysis
    • Compare Users
    • PeopleTools Access
    • Portal Menus
  • Audit Review
    • Audit Review Setup
    • Privileged Access
    • Sensitive Data
    • Segregation of Duties
    • Correction Access
    • Restricted Roles
    • Role Changes
    • Notifications
    • Manager Reports
  • Access Requests
    • Implementation Guide
    • Submit New Request
    • Review & Approve Requests
    • Workflows & Routing
    • Apply Changes
  • Resources
    • User Training Guide
    • Policies
      • Policy Overview
      • Data Privacy
      • Cloud Security
      • Software Development
      • Disaster Recovery
      • Service Level Agreement
      • Employees
Powered by GitBook
On this page
  1. Security Administration

Security Matrix

Environments - [Select Environment] - Security Matrix

PreviousFluid SecurityNextCompare Reports

Last updated 1 year ago

The Security Matrix is a powerful analytics tool for exploring security permissions for any page.

The number of Users, Roles, and Permission Lists for the environment are displayed at the top. A clickable list of modules is shown below and includes User, Role, and Permission List insights.

Clicking a module will display the module access details, including the number of Users, Roles, and Permission Lists, and a full list of pages.

Users, Roles, and Permission Lists columns act as a clickable filter to sort in ascending or descending order. Pages can also be filtered in the Submenu Folder.

Clicking a page will display the page access details, including a list of Users and the Roles and Permission Lists that have been assigned to them.

The right-side panel acts as a clickable filter to sort by Roles. You can also use the top menus to sort by User Access, Roles, or Permission Lists.

  • Users - A list of Users with Page Access. *Click for User Quick View*

  • User Access - A list of assigned Roles and Permission Lists providing Page Access. *Click for User Quick View*

  • Roles - A list of Roles that grant access. *Click to navigate to Role*

  • Permission Lists - A List of Permission Lists that grant access. *Click to navigate to Permission List*

Users, Roles, and Permission Lists columns act as a filter and can be sorted in ascending or descending order.
Users, Roles, and Permission Lists columns act as a filter and can be sorted in ascending or descending order.