Previous Topic: Defining Users to DepartmentsNext Topic: The NAME Field


Documentation of Security File Design

Ddocument your Security File design, and what you have intended with this design and approach.