This topic presents the concepts that are essential for understanding the access control model used by the system.
More:
Extended Role-Based Access Control Model
Person
User
Groups of People
Profiles
Roles
Lists of Role Restrictions
Privileges
Permissions to Privileges
Controlling Access to the System Modules and Solutions
Inheriting Permissions via Inclusion in Profiles
Inheriting Permissions via Assignment to Roles
The Authorization Policy
Customizing the Default Authorization Policy
Restoring the Default Authorization Policy
Default Permissions Granted to Profiles
Default Permissions Granted to Roles
Modifying Default Permissions Granted to Roles
Granting Additional Permissions to Roles