This section contains the following topics:
Setting Access Authority - Examples
How Access Authority to a Resource Is Determined
Interaction Between User and Group Access Authorities
Security Levels, Categories, and Labels
Copyright © 2013 CA Technologies.
All rights reserved.
|
|