# Activity Details
2.1 Populate the TE Self-Blueprint Populate all tabs of the TE Self-Blueprint.
2.2 Agree TE user roles Review the TE Security Roles Matrix spreadsheet, and identify which roles will be needed within your organisation based on existing roles/responsibilities and processes and the decisions made on required Control Points and Approvers.

Depending on the nature of your TE Implementation, a formal Blueprint document may be provided by Basis Technologies as part of the Design phase of your TE project.


Was this helpful?

Yes No
You indicated this topic was not helpful to you ...
Could you please leave a comment telling us why? Thank you!
Thanks for your feedback.

Post your comment on this topic.

Post Comment