You set up Horizon security by defining the users who have access to your system, the processes they have access to, and the information they can change. You accomplish this through the use of users, roles and passkeys, ownerships, and groups. This section explains each of these elements and how they work together to grant or restrict rights.
This section explains these topics:
• | Overview |
• | Users |
• | Roles and Passkeys |
• | Ownerships |
• | Groups |
• | Granting Rights to Users |
© 1998-2017 Sirsi Corporation