The security features of the system can be controlled through this section. This includes the password policies that are to be enforced so that they can match the local requirements that are in place. Access control to the system can be managed with User Roles that determine what a user can see and configure on the system.
To configure the Security Policies:
To configure the User Role: