Before you allow users to use the system, it is important to set up security to control what aspects of the system users can access, what level of access they have, and how they are authenticated when they log into the system.
This section contains the following topics:
Support Automation Access Control
Copyright © 2013 CA.
All rights reserved. |
Tell Technical Publications how we can improve this information |