Security
The Security permission defines whether the User or User Group can access and alter the security settings of the selected item. The Security permission is used in conjunction with the Configure permission. When working with security-related database items (such as User Accounts, User Patterns, User Groups
- To configure, delete, rename, modify, or convert a security-related database item, you need to have the Configure and Security permissions for that security-related database item.
- To create, copy, or import a security-related database item, you need to have the Configure and Security permissions for the Group or system that is to contain the new security-related database item.
- To move a security-related database item, you need to have the Configure and Security permissions for both the security-related database item and the target Group or system (the Group or system to where the security-related database item is being moved).
These rules also apply to Groups that contain security-related database items.
Availability: Is available to any User or User Group with the Security permission for the selected item. The Security permission cannot be restricted (you can only stop Users and User Groups from having access to the security settings by denying them the Security permission for database items on a per item basis).
SECURITY THREAT