...
View file | ||||
---|---|---|---|---|
|
For Discussion
# | Question | Comment | Owner |
---|---|---|---|
1 | an the security model be applied at the 2nd level? i.e. exclude certain functionality from particular user types? | ||
2 | will the team managing ref tables be central v local? | ||
3 | will the team managing users be central v local? | ||
4 | could there be an overlap of the two roles? | ||
5 | how many groupings should there be (roughly) for reference tables and what are they? |