You set up Horizon security by defining the users who have access to your system, the processes they have access to, and the information they can change. You accomplish this through the use of users, roles and passkeys, ownerships, and groups. (For more information on how security works, see “Securing Horizon” in the “Security and Preferences” chapter of the System Administration Guide.)
This section explains these topics:
• | Program Passkey Privileges in Acquisitions |
• | Role Privileges in Acquisitions |
© 1998-2017 Sirsi Corporation