Role-based Security Overview

Security is based on roles. Roles combine tasks and permissions to determine a user's level of access to a feature area. You create roles in one of three ways:

Note: To effectively assign security, it is important to review each topic in this section to fully understand the framework and its impact on your database. It's also important to review your roles often to determine whether or not you need adjustments for new or changed tasks and permissions.