...
# | Question | Comment | Owner |
---|---|---|---|
1 | Can the security model be applied at the 2nd level? i.e. exclude certain functionality from particular user types? | Yes, in fact it is simpler to do so | Former user (Deleted) to discuss w/ Graham |
2 | will Will the team managing ref tables be central v local? | Local Data Admin - they have access to components + data mgmt | |
3 | will the team managing users be central v local? | Central - they have have access to everything includeing all components, user mgmt and data mgmt | |
4 | could Could there be an overlap of the two roles? So that one or both teams would need access to both areas | Yes, see #3 | |
5 | how many groupings should there be (roughly) for reference tables and what are they? (Go through known reference tables and group them up | DRAFT (1) Diversity | Marital Status, Sexual Orientation, Ethnic Origin, Gender, Religious Belief, Title (2) College Schools | College, GDC Status, GMC Status, Designated Body Code (DBC) (3) Visa | Settled, Immigration (4) Training | Grade, Training Number, Training Number Type (5) Programme Membership| Programme Membership Type (6) Curriculum | Curriculum, Specialty, Specialty Group, Curriculum Sub-Type (7) Locations | Site, Local Office, Trust (8) Medical School | Medical School (9) Country | Country (10) Nationality Nationality | Nationality (11) Funding Miscellaneous | Funding Type, Placement Type, Assessment Type, Leaving Destination (12) Status General | Status, Inactive Reason, Role (to be removed?) |
...