8,849
edits
Changes
no edit summary
This security scheme should be used when the relationships between [[User|users]] and the resources are more complex and you need to provide access to resources independent of any organisational structure.
==See Also==
*[[The Key Control Element – Roles]]
[[Category:Roles]][[Category:Security]]