Graphical user interface, text, application, email
Description automatically generated
Box 1: Security role
Scenario: Employees must only be able to access their own time tracking records from the app.
Testers report that they can see time entries in the Time Tracker app, not just their own.
Box 2: Field-level security
Scenario: Employees must only be able to modify time records for the current and previous day.
Testers report that they can edit any existing time entries.
Box 3: Hierarchical security
You use field security tables to apply field-level security, which restricts field access to specified users and teams.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit