Security Components

EPM System security comprises two complementary layers that control user access and permissions: