Previous Topic: Web Service OptionsNext Topic: Access Types


Security and Role Management

Before you allow users to use the system, it is important to set up security to control what aspects of the system users can access, what level of access they have, and how they are authenticated when they log into the system.

This section contains the following topics:

Access Types

Contacts

Data Partitions

Groups

Role Management

Support Automation Access Control

Functional Access Areas

Tenant Groups

Tenants

Terms of Usage

UNC Credentials