The security model consists of several components, such as users, access groups, roles, domains, owning groups, and so forth. To configure access for your users, you must use all these pieces to create role-specific permission sets, granting certain users access to specific objects and functionality, while granting different users different permissions. The diagram below illustrates the various steps required to configure an entire security structure for a configuration.
Click a box in the diagram to go to the associated procedure.