SAP SuccessFactors Learning uses a security model which is different from the Role-Based Permissions (RBP) model that is used in the other SAP SuccessFactors solutions.
In SAP SuccessFactors Learning, different security objects are used to control data access. It uses a combination of security domains, security domain groups, permissions, and roles.
Security Domains and Hierarchy

- Security Domain - SAP SuccessFactors Learning creates areas of data access through the use of security domains. Security domains are used to indicate what data can be seen and by whom. Security domains can be built in a hierarchical structure, with each security domain having one or more children. Security domains should be created wherever there is a need to restrict data to some administrators and prevent other administrators from searching, viewing, editing, adding, or deleting the data. In the diagram, Example of Domain Hierarchy, you have different levels of domain.
- Root Domain (or Corporate Domain) - This is the highest level in the security domain tree hierarchy. The domain level starts from zero.
- Domain B - Each security domain can have one or more child domains. Each sub-domain is numbered one level higher that its parent (e.g. a sub-domain created under the Root Domain is a level 1)
- Public Domain - This is the only unsecured domain in LMS and cannot be deleted. When new entities are created, the domain field is pre-populated to the Public domain. The admin should choose the correct security domain instead of the Public domain.
Note
It is recommended to have the smallest amount of security domains that are actually needed to prevent administrators from accessing entities that are outside their responsibly that they must not access.
- Security Domain Groups - A group of one or more security domains. When applied to the permissions in an admin role, this will restrict the domains in which an admin may perform the permissions.
- Permissions - A combination of functions (such as view, add, delete, copy, and so on) and an entity (users, items, classes, instructors, assignment profiles, etc.)
- Roles - Roles are associated to admins. A role is made up of a list of permissions and security domains. The permissions control the functions the role can perform and the Security Domain Groups control the domain the role perform the functions in.