Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: March 2019
 
 

User Security Features in Trusted Extensions

    Trusted Extensions software adds the following security features to users, roles, or rights profiles:

  • A user has a label range within which the user can use the system.

  • A role has a label range within which the role can be used to perform administrative tasks.

  • Commands in a Trusted Extensions rights profile have a label attribute. The command must be performed within a label range, or at a particular label.