Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This section describes how to configure the Eagle Portal security roles, how to configure the Global Settings Explorer, User Settings Explorer, and the Portal Query Explorer options, and how to manage user impersonation.