Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

How To Article | HTA-20220531-LG-30

iProtect Access / Security | How To Articles | Authorizations |

Image ModifiedPDF Download

View file
nameHTA-20220531-LG-30.pdf

Table of Contents

In general, iProtect™ is used within an organization by people with diverse functions. Not everyone has the same rights and powers when working with iProtect™. You can define what everyone’s rights are. These rights are often related to the function that someone has. Often there will be several people who have similar rights. For this reason, it was decided not to set the rights per user, but per user group. Once the rights of the different user groups are properly defined, you can grant rights to a new user by assigning the correct user group. Any changes to a user group’s permissions will apply to all users who are part of that user group.

...