Implementing Security › Administering Resource Level Security
For instructions on how to secure resources, see the User Guide.