|Populate the TE Self-Blueprint
|Populate all tabs of the TE Self-Blueprint.
|Agree TE user roles
|Review the TE Security Roles Matrix spreadsheet, and identify which roles will be needed within your organisation based on existing roles/responsibilities and processes and the decisions made on required Control Points and Approvers.
Depending on the nature of your TE Implementation, a formal Blueprint document may be provided by Basis Technologies as part of the Design phase of your TE project.
Thanks for your feedback.