This page was last edited on August 22, 2014, at 13:37.
Comments or questions about this documentation? Contact us for support!
Role-Based Access Control replaces Security Policies in iWD 8.5. For details of how to use this feature please see:
Role privileges in iWD are arranged in the following groups:
The following additional information is also important to note when you are filtering permissions: