| # | Activity | Details |
| 2.1 | Populate the TE Self-Blueprint | Populate all tabs of the TE Self-Blueprint. |
| 2.2 | Agree TE user roles | Review the TE Security Roles Matrix spreadsheet, and identify which roles will be needed within your organisation based on existing roles/responsibilities and processes and the decisions made on required Control Points and Approvers. |
Depending on the nature of your TE Implementation, a formal Blueprint document may be provided by Basis Technologies as part of the Design phase of your TE project.


Post your comment on this topic.