Versions Compared
compared with
Key
- This line was added.
- This line was removed.
- Formatting was changed.
This section describes how to configure Eagle Portal security roles, Global Settings Explorer, User Settings Explorer, Portal Query Explorer options, and how to manage user impersonation.