Chapter 3. System Security
System User Maintenance
A user has to be registered with a module/modules in order to have access to Pericles. Once he is registered, he can have access to different procedures according to his right. However, a user need not be registered if no system security functions are set.
Listed below are the four items you can set for each user.
|