How to use ESHA Security
NOTE: for any users who will be utilizing and configuring permissions within ESHA Security, the minimum Roles required to add new users and assign them to roles is membership the the following 3 roles:
- Server Role 'securityadmin'
- Database Role 'db_accessadmin'
- Database Role 'db_securityadmin'
ESHA Security consists of the following functions, each of which are performed using a page in the Access Control Utility: