This chapter presents an overview of e-Biz Impact security using role-based authorization.
View this book as PDF