Security Management
The Guided Procedures (GP) administration tools provide the means to control data and user permissions.
To ensure that your system is adequately protected, you can:
| Activity | Location |
|---|---|
|
Assign different view permission levels to the individual functions and callable objects of the design time. For more information, see Managing Permissions . |
General → Manage Permissions |
|
Configure impersonation settings for callable objects that access security data. For more information, see: |
General → Impersonation Manager General → Impersonation History |