Plan Your Security Configuration

This topic describes how you should plan to use security in Millennium® 3 by providing some tips and providing examples.

As discussed in Introduction to Millennium® Security, security in Millennium® 3 is accomplished through roles and users. Each of these features contain rules to either prevent or allow them to perform certain tasks, view certain screens, and edit certain data.

This topic provides information on the following subjects:

Other topics explain the following:

  • How to create a role and associated rules & rule conditions (Setting Up Roles)
  • How to create a user and associated user rules (Setting Up Users)
  • Specific & comprehensive examples of applying security in Millennium® 3 (see Examples)