Administrators responsible for configuring access privileges granted to roles and users need to understand the security rights they can configure for Risk Management.
Topics