A security profile lists the access that a user has after all the security groups are combined. This example shows an approach to building a security profile for one organization with two security groups.
In the following example, an organization has two security groups: the worker security group and the management security group. The security profile is the result of combining the groups to restrict access to applications, and limits and tolerances.
For example, the security profile for the worker security group does not provide access to purchase requisitions and financials, and does not have a purchase limit.