This section contains the following topics:
Setting Access Authority - Examples
How Access Authority to a Resource Is Determined
Interaction Between User and Group Access Authorities
Security Levels, Categories, and Labels
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |