Exit Print View
This chapter provides the Trusted Extensions procedures for configuring and managing users, user accounts, and rights profiles.
Customizing the User Environment for Security
Managing Users and Rights