Running the Purge Security Profiles Process

Run the Purge Security Profiles process to remove security profiles that are not in use from database. Run this program to first identify security profiles that are not used and then purge all the unused security profiles or any specific security profile that is not required.

For information on security profiles, see: Security Profiles

You run this process from the Submit Request window.

Prerequisites

arrow icon   To run the Purge Security Profiles process:

  1. In the Name field, select Purge Security Profiles.

  2. Select Yes in the List Unused Security Profiles field if you want to view a list of security profiles that are not in use. Click OK and then Submit. Navigate to the Find Requests window, search for your request ID, and then view log of the request. Review the list of unused security profiles. Based on your analysis, you can perform step 3 or 4.

    Note: You can directly purge all unused security profiles or a specific security profile, if required, without performing step 2. You must set the mandatory parameter List Unused Security Profiles to No to perform step 3 or 4.

  3. Select Yes in the Purge all Unused Security Profiles field to remove data of security profiles that are not in use.

  4. Enter the name of the specific security profile that you want to purge in the Security Profile Name field. This security profile must be one of the security profiles list generated in step 2.

  5. Click OK and submit the process.