Previous Topic: How to Configure the User InterfaceNext Topic: Hide an Object


Object Access Configuration

You can configure object access to help protect the integrity of the data, prevent users from performing unauthorized tasks, and provide users with only the information appropriate for their job functions. You can configure object access in the following ways:

Combine object access and field configuration to enforce more granular levels of access.