Plan Your Security Configuration
This
As discussed in Introduction to Millennium® Security, security in Millennium® 3 is accomplished through roles and users. Each of these features contain rules to either prevent or allow them to perform certain tasks, view certain screens, and edit certain data.
This
Other
- How to create a role and associated rules & rule conditions (Setting Up Roles)
- How to create a user and associated user rules (Setting Up Users)
- Specific & comprehensive examples of applying security in Millennium® 3 (see Examples)