Security

This section describes the process to specify the users, roles, and the data security rules.