Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 25 Next »

This section describes how to configure the Eagle Portal security roles, how to configure the Global Settings Explorer, User Settings Explorer, and the Portal Query Explorer options, and how to manage user impersonation.

  • No labels

0 Comments

You are not logged in. Any changes you make will be marked as anonymous. You may want to Log In if you already have an account.