Risk Analysis
Run user and role analyses to identify access risk conflicts.
Running User Analysis
Analyze risks at the user level to identify which users have conflicts.
Running Role Analysis
Analyze risks at the role level to identify inherent conflicts in role design.
Understanding Results
How to read and interpret risk analysis results.
Filtering and Sorting Results
How to filter, sort, and navigate analysis results.