Security Role Mapping Tool Access

As part of the initial security role mapping exercise, one to two people from your college or unit should be designated to access the Security Role Mapping Tool. Please list below, including yourself if you are to be one of the designees.

Security Role Tool Access

Your Name
Name of Designee #1
Name of Designee #2
Page Contents