Designing a Security Domain Group

Objective

After completing this lesson, you will be able to create a security domain group.

Security Domain Groups

Security Domain Groups (formerly known as Domain Restrictions) are entities that determine in which security domains an administrator may perform permissions. For example, if the North-America Security Domain Group contains the North-Am, North-Am-Sales, and North-Am-HR security domains, administrators with roles with the North-America Security Domain Group applied can access entities that reside in North-Am, North-Am-Sales, and North-Am-HR security domains (plus the PUBLIC Security Domain which is automatically added to every security domain group).

If there are no security domain groups applied to permissions in an Administrator Role, the Administrator may perform all permissions in the role in all security domains.

Flow diagram showing Company XYZ at the top and the security domain groups for its European and North American organizations below.

Security domain groups can contain one or more security domains. The security domains do not need to be connected in the hierarchical structure, but there are patterns to how customers implement security domain groups:

  • Family branch: An administrator is responsible for the entities within the Europe region, which includes access to the entities in the Europe Security Domain and its subdomains, Europe-Sales and Europe-HR.
  • Sibling: An administrator is responsible for managing siblings within the same branch. For example, an administrator has access to the entities in Europe-Sales and Europe-HR, but not in the parent security domain (Europe).
  • Parent-child: An administrator is responsible for a parent security domain and one or more child domains, but not the entire branch. For example, an administrator has access to entities in the Europe Security Domain and the Europe-HR Security Domain.
  • Mix-and-match: Any security domains can be included in a security domain group, whether they are from different parts of the same security domain tree or even from different trees.

Create a Security Domain Group

Business Example

In this exercise, you will first create a Security Domain Group for the European domain and then create a Security Domain Group for the North American domain.

Steps

  1. Create two Security Domain Groups with the details below.

    FieldValueExample
    Domain Group ID[YourInitials]-EU[YourInitials]-NA
    DescriptionEU_[YourInitials]_SDGNA_[YourInitials]_SDG
    Security DomainACME-CORPACME-CORP
    Sub DomainsEurope SubdomainNorth America Subdomain
    1. Log in to SAP SuccessFactors HCM as a Learning Administrator and navigate to Learning Administration → System Administration → Security → Security Domain Groups.

    2. Select Add New.

    3. Enter the Security Domain Group ID: [YourInitials]-EU.

    4. Enter a Description: EU_[YourInitials]_SDG.

    5. Select ACME-CORP Security Domain to save the Security Domain Group entity.

    6. Select Add.

    7. Select the Security Domains tab to add security domains to your Security Domain Group.

    8. Select Add one or more from list to add the security domains.

    9. Search for and select the Europe Subdomain.

    10. Select Add.

    11. Select Apply Changes.

    12. Repeat the steps to create a security domain group for North America. Use [YourInitials-NA] and NA_[YourInitials]_SDG respectively

Summary

  • Security domain groups define which security domains administrators can access based on their assigned roles.
  • These groups can include multiple security domains, including PUBLIC, allowing flexible configurations for access.
  • If no security domain group is assigned, administrators can access all permissions in their role in all domains.