Table of Contents | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|
Role Based Security
Role Based Security is a method of controlling or restricting access to a software system. It employs the following constructs to achieve security control:
...
Info | ||
---|---|---|
| ||
See the Enhanced Role Configuration page for instructions to setup security in ACM version 8.0 and later. Set the Role Configuration page for instructions to setup security on ACM Build 306 and earlier. |
...