Previous Topic: Types of Users

Next Topic: Groups

Security Policies and Users

When preparing the implementation, you should decide: