Skip to Main Content
Return to Navigation

Implementing Query Security

These topics discuss how to:

Note: You perform these setup tasks using the Query Access Manager, Application Designer, and permission lists. After you define Query Access Group trees, you provide user access using the Query tab in Permission Lists.