This view allows you to define security settings.
Security settings are defined in terms of roles and permissions. When a role is assigned to a permission users with the given role will be able to perform tasks associated with the permission on the object.
Roles are listed in columns and permissions are listed in rows. To assign a role to a permission check the checkbox at the intersection of the row and column. You can also manage roles and permissions individually by clicking on their name links.
You can create new roles by entering the role name in the text
entry field under the
User defined roles heading and clicking
Add Role button. You can delete any existing user defined
roles by selecting them from the selection list under the
defined roles heading and clicking the
Delete Role button.
You can create and manage local roles by clicking the
local roles link.
You can manage the permissions assigned to a role by clicking on the role name.
You can manage the roles assigned to a permission by clicking on the permission name.
Acquire permission settings check box next to each
permission indicates whether this item should inherit security
settings for this permission from its container object. The
acquired permission settings may be augmented by selecting roles
for a permission in addition to selecting to acquire
You can manage the acquisition of permission
settings individually by clicking the