The agenda for this session included:
- Understanding domain and BP security policies
- Difference between user-based and role-based security
- Configuring recruiting admin security groups
- Understanding constrained and unconstrained roles
- Reviewing recruiting related security access
- Introduction to recruiting business processes
- Clarifying recruiter and manager role access