Rights — Users / Roles
The Rights — Users / Roles screen pivots the rights matrix by user and role. One line per (Application, User, Role, Object) quadruplet. It returns every SER_RUN = 'Y' row — both the direct user-level rights and the inherited role-level rights resolved on a per-user basis.
This is the effective rights view: what each user actually carries, broken down by where the right comes from.
At a glance
Goal of the view
The pivot makes three questions immediate:
- What can this user actually do? Filter on a single User ID to obtain the full effective wallet — direct grants and inherited grants together. The roles column tells you which role lit up each row.
- Through which role? When the same right surfaces under several roles, those roles are partial duplicates — candidates for consolidation.
- Is the user holding a right outside any role? A row with an empty Role ID is a direct user-level grant — see Rights — Users for the dedicated screen.
Columns
| Column | Source | What it tells you |
|---|---|---|
| Application ID | SER_APPS_ID — application identifier. Filterable. | Which application the right applies to. |
| User ID | SER_USER_ID — user holding the right. Filterable, scoped to the application. | The effective holder of the right. |
| Role ID | SER_ROLE_ID — role granting the right. Filterable by source. | The role the right was inherited from. Empty (or *ROLE) on the source side means direct user-level grant. |
| Object | SER_OBJECT — technical object. Filterable, scoped to the application. | What the right unlocks. |
| Form | SERL_FORM — form code within the object. | Specific form. |
| Version | SER_VERSION — processing version. | Configuration variant. |
| Run / Add / Change / Delete | SER_RUN, SER_ADD, SER_CHG, SER_DEL — Y / N. | Action flags. Only Run = Y rows surface. |
| Role Action ID | SER_ROLE_ACTION_ID — action identifier. | Source-system action descriptor. |
Tips & best practices
- Filter on a single User ID to get the user's full effective wallet — the answer most auditors actually need.
- Group by Object on a user filter to spot when the same object surfaces through multiple roles. Each duplicate is a hint that role membership could be trimmed.
- A user with rights coming through a single role + few direct grants is the cleanest setup — the inverse (many direct grants, few or no roles) is the heaviest to audit.
- Combine with the Conflicts → Details screen to confirm the role pair that generates a given SoD conflict.