Security user proxies, alternates, and delegates

This section describes how to set up the user proxy feature, as well as assign user references, either alternates or delegates.