Role management
Abstract
The security model employed by the new role management allows granular and transparent control over user permissions.
The security model is employed by the new role management, which allows granular and transparent control over user permissions across all Hierarchical Entities, Devices, Signals, and other general operations.
As we shall see in the upcoming articles, role management is based on the following concepts: