Configuration-independent items that are used to set different security levels, which can be applied to objects in a configuration. They can be used to control the confidentiality or restrict the availability of the objects.
Configuration-independent items that are used to set different security levels, which can be applied to objects in a configuration. They can be used to control the confidentiality or restrict the availability of the objects.