Table of Contents


  1. Preface
  2. Introduction to MDM Hub Security
  3. Resources
  4. Roles
  5. Users and User Groups
  6. Security Providers
  7. Application Level Security
  8. Password Hashing
  9. Glossary

Role Configuration

Role Configuration

You can create, edit, and delete roles in the
If you use a comprehensive centralized security deployment, in which users are authorized externally, you do not need to configure roles.
Resource privileges vary based on the scope of access required for users to do their jobs. The best practice for administrators is to follow the principle of least privilege. Assign to users the lowest level of privilege needed to do their work.


We’d like to hear from you!