Security Management

The Guided Procedures (GP) administration tools provide the means to control data and user permissions.

To ensure that your system is adequately protected, you can:

Activity Location

Assign different view permission levels to the individual functions and callable objects of the design time.

For more information, see Managing Permissions .

General  → Manage Permissions

Configure impersonation settings for callable objects that access security data.

For more information, see:

General  → Impersonation Manager

General  → Impersonation History