Page History
...
- Users have appropriate access to the system. This is done by creating users, assigning role permissions, and defining any source filter requirementsany source filter requirements.
- Users have appropriate access to data. This is done by creating and assigning access to Data Sources and Views.
- Users have appropriate access to content. This is done by creating and assigning access to Content Folders.
- The system is correctly configured. This is done by defining the Configuration and Content Settings settings required.
...