Resource Security
Resource security for users and roles can be set by an administrator. The application administrator can select one or more grantees. Moreover, the access control lists for grantees can be created for all or any specific resources. If a user and its role are selected as grantees, the user access permissions override the role permissions.
Copyright © Cloud Software Group, Inc. All rights reserved.