9.0 Introduction
Items in a source will have some kind of user or permission information associated with them and the security mapping feature can be used to help transfer this information into the target if necessary. For example, the Created By of a document in the source may be a name of a user but in the target, this needs to be in an email address format.
Security Mapping uses a table of source values which is edited to associate these entries with a new target value. This is typically achieved by editing a .CSV file which can be exported and imported into the client.
Security mapping is required because such information stored on the source may not be directly transferred ‘as is’ because it may not be compatible with the requirements of the target platform. For example a document author may be a simple text string in the source but must be an email address in the target.
Comments