/
How to use ESHA Security
How to use ESHA Security
NOTE: for any users who will be utilizing and configuring permissions within ESHA Security, the minimum Roles required to add new users and assign them to roles is membership the the following 3 roles:
- Server Role 'securityadmin'
- Database Role 'db_accessadmin'
- Database Role 'db_securityadmin'
ESHA Security consists of the following functions, each of which are performed using a page in the Access Control Utility:
Related content
Security Access Levels
Security Access Levels
More like this
ESHA Security
ESHA Security
More like this
Working with Users
Working with Users
More like this
Granting User Access
Granting User Access
More like this
Compatibility Notes
Compatibility Notes
More like this
Working with Database
Working with Database
More like this