In ACI, you can secure your organization’s data by setting access permissions for the entries. You specify which users and groups have access to a specific report or other content in ACI. You also specify the actions they can perform on the content.

When you set access permissions, you can reference both authentication provider users, groups, and roles and ACI groups and roles. However, if you plan to deploy your application in the future, we recommend that you use only the ACI groups and roles to set up access to entries in ACI to simplify the process.

 
loading table of contents...