Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

#QuestionCommentOwner
1Can the security model be applied at the 2nd level? i.e. exclude certain functionality from particular user types?Yes, in fact it is simpler to do so
Former user (Deleted) to discuss w/ Graham
2will Will the team managing ref tables be central v local?Local Data Admin - they have access to components + data mgmt
3will the team managing users be central v local?Central - they have have access to everything includeing all components, user mgmt and data mgmt
4could Could there be an overlap of the two roles? So that one or both teams would need access to both areasYes, see #3
5how many groupings should there be (roughly) for reference tables and what are they? (Go through known reference tables and group them up

DRAFT

(1) Diversity | Marital Status, Sexual Orientation, Ethnic Origin, Gender, Religious Belief, Title

(2)  College Schools | College, GDC Status, GMC Status, Designated Body Code (DBC)

(3) Visa | Settled, Immigration

(4) Training | Grade, Training Number, Training Number Type

(5) Programme Membership| Programme Membership Type

(6) Curriculum | Curriculum, Specialty, Specialty Group, Curriculum Sub-Type

(7) Locations | Site, Local Office, Trust

(8) Medical School | Medical School

(9) Country | Country

(10)  Nationality Nationality | Nationality

(11)  Funding Miscellaneous | Funding Type, Placement Type, Assessment Type, Leaving Destination

(12)  Status General | Status, Inactive Reason, Role (to be removed?)


...