Return to the iSSecurity Tips
Role-Based Access by Carol Woodbury
Controlling authority using roles saves time, requires less effort and meets auditing challenges.
http://www.ibmsystemsmag.com/i5/enewsletterexclusive/22179p1.aspx
The above link may require a free, or paid, registration to view the article.
[report a broken link by clicking here]