
Access Management Features
Fully configurable access roles based on security permissions
Build your access roles to match your organizational needs, by choosing from an extended list of permissions, which define the actions allowed in the application.