Specialized Administration > Ensuring Data Security > Access Control > Managing Access to Enterprise Information > Life Cycle Managed Information > Example of Using Life Cycle Roles
  
Example of Using Life Cycle Roles
When an object is created, the user may be asked to select a life cycle and a team for it. Life cycle roles can be resolved by mapping them to team roles, which are then mapped to actual users.
For example, assume the following:
For the Under Review phase of the Development life cycle, the life cycle role Promoter is mapped to the team role Team Leader and Modify permission is granted to the Promoter role.
In the Prototype team, Team Leader is mapped to Amanda Smith.
The policy access control rule does not grant or absolutely deny Amanda Smith Modify rights to design documents.
Then, user Pat Johnson chooses the Development life cycle and selects Prototype as the team when he creates a design document in a shared cabinet.
Later, when the design document is promoted to the Under Review phase in its life cycle, Amanda Smith becomes the Promoter. Although the policy ACL does not grant Amanda modify rights to design documents, she does have that access permission for Pat's document as long as the document is in Under Review phase (that is, until she submits it for promotion to its next life cycle phase).