Additional Information

For areas that are presented in the JET UI, user access is controlled by the new Security Policies subsystem. Any custom overrides to the core access rule, including any that have previously been applied using the ECHO Permissions spreadsheet, must be applied using the new method.

This section provides additional information on configuring custom Security Policy overrides.