Security Setup Example
About this task
The following example takes you through the process of establishing your security needs and defining and setting up the levels of security.
User | Needs | Added to Security Group |
---|---|---|
USER1 | Power user. Needs total access to security. | iH Security Admins |
USER2 USER3 USER5 USER6 USER8 |
|
|
USER4 USER7 |
|
|
USER9-14 | Read Data. | iH Readers |