Changes

Jump to: navigation, search

Overview of the Security Models

9 bytes added, 19:28, 31 October 2007
no edit summary
You can use these schemes separately or together to control people’s access to any resource.
The [[User|user’s ]] interface is also controlled by their [[Role|role]]. Roles are used to control the [[Menu|menu]] items displayed to the [[User|user]], or alternatively, to display a “portal view” to the user overriding the [[Administration Interface|administrative]] interface.
[[Category:System Management]][[Category:Roles]][[Category:Security]]
4,401
edits

Navigation menu