“I need access to do my job!” is a frequent complaint by a system’s new users. Through the creation of job roles and their underlying system access, the users of a system have the ability to do what they need to do and no more. Inefficiency and business risk result when roles and security are not properly addressed. Roles and security can only be set appropriately when there is a thorough understanding of the business needs, the process best practices, and the system itself. Telesto Group uses its knowledge of these factors to create a significantly simplified role and authorization structure.

Through the correct use of single and composite roles, the cost of maintaining roles and authorizations is significantly reduced. Telesto Group uses its methodology to create baseline roles as a building block to be used in the creation of composite roles that map to organizational responsibilities. Through the use of the Telesto Business Integrator ® (TBI), the roles and security are visually and dynamically presented for each process.