Resource Security

Resource security for users and roles can be set by an administrator. The application administrator can select one or more grantees. Moreover, the access control lists for grantees can be created for all or any specific resources. If a user and its role are selected as grantees, the user access permissions override the role permissions.

Note: Names of the objects and permissions shown in these screens can be customized and may be different from what you see on your screen.