Roles
The Roles screen lists every role defined in the security tables of each connected application. One line per (Application, Role) pair: it is the authoritative inventory of the role names users are allowed to be assigned to.
A role is the permission container the source system exposes — *ROLE on JD Edwards EnterpriseOne, PFCG profiles on SAP, permission sets on NetSuite. Nomasx-1 reads the catalog as-is from the source.
At a glance
Goal of the view
For each role known to any connected application, answer three questions in one glance:
- Which roles exist? The role catalog drives every other security view — assignments, conflicts, segregation-of-duties matrices.
- What does the role represent? The role name is the human-readable label visible to administrators. It should be self-explanatory and follow the company naming convention.
- In what order is the role evaluated? The sequence drives the precedence at login when the source system lets a user inherit configuration from several roles. Lower number = earlier evaluation = stronger precedence (JDE convention).
The screen is the entry point when an auditor asks "give me the list of roles in scope" or when a new SoD matrix is being built.
Columns
| Column | Source | What it tells you |
|---|---|---|
| Application ID | ROL_APPS_ID — application identifier from the source system (numeric reference). | Which application the role belongs to. |
| Role ID | ROL_ID — role identifier (technical name). | The role's technical name as known to the source system. |
| Role Name | ROL_NAME — descriptive name. | Human-readable label. |
| Sequence | ROL_SEQ — numeric. | Evaluation order at login. Lower runs first; used by the source system to resolve precedence between several roles held by the same user. |
Hidden columns kept on the row: ROL_DT_REFRESH, ROL_UKID (used by downstream screens and reconciliation).
The single filter input above the grid (Application ID) supports the standard contains / equals / not equals / starts with / ends with operators.
On JD Edwards EnterpriseOne, *ALL is the default sign-on role — when a user signs on with *ALL, the security of every role assigned to them is combined and applied at once. The alternative is to sign on under a single specific role, applying only that role's security. Whether or not *ALL appears as a literal row on the Roles catalog depends on the installation: most do not need explicit *ALL-level overrides.
Tips & best practices
- Compare the catalog with the Roles not used screen to spot roles that exist but were never assigned. These are typically the leftover of past reorganisations.
- Look for near-duplicate role names (e.g.
ACCT_APvsACCT_AP_OLD). A role rename in the source system creates a new row — the old one usually stays around until a manual cleanup. - Use the Sequence column to identify the role with the lowest sequence that a user holds — this is the role driving most of the runtime behavior on JDE.
- Click on a role to open the Assignments screen filtered on that role — the fastest way to count holders before deciding to delete it.