I have a pedantic question about the Landmark security for Configuration Management that seemed like it might be a little too in the weeds for our weekly phone call, so I thought I'd be the first customer to post a question here instead. :-)
First some background—
Page 7 of the draft Infor Configuration Management Reference Guide for Landmark Technology, Financials and Supply Management, and HR Talent (dated July 16, 2024) says:

Each of these security classes are associated with a role (coincidentally) of the same name:

Each of those roles has only the security classes of the same name associated with them:

The BOTagAdminAccess_ST and BOTagUserAccess_ST security classes both grant access to only two Business Classes: BusinessObjectTag and BusinessObjectTagItem. The BOTagAdminAccess_ST class (and hence role) grants unconditional access for all actions on both. The BOTagUserAccess_ST class unconditionally grants inquiry access on BusinessObjectTag and all actions on BusinessObjectTagItem.
The business logic LPL for BusinessObjectTagItem has some "extra" security checks:

Observation: While the documentation says that a user needs a role that is associated with the "BOTagUserAccess_ST security class" the LPL is checking to see that the user has the BOTagUserAccess_ST role. Despite the shared name, those are different. So the documentation is buggy as things stand. However, that begs my question—
Question: Landmark Security can (and does) already control who has access to perform certain actions. Why the extra check for a specific hardcoded role (and forcing it to be that role and only that role)? Someone thought it was necessary or desirable; I'd like to be able to understand why.