# | Activity | Details |
2.1 | Populate the TE Self-Blueprint | Populate all tabs of the TE Self-Blueprint. |
2.2 | Agree TE user roles | Review the TE Security Roles Matrix spreadsheet, and identify which roles will be needed within your organisation based on existing roles/responsibilities and processes and the decisions made on required Control Points and Approvers. |
Depending on the nature of your TE Implementation, a formal Blueprint document may be provided by Basis Technologies as part of the Design phase of your TE project.
Post your comment on this topic.