Solved
Forum Discussion
KH1
2 months agoContributor II
Slice Security by U1# has been deployed by following several earlier posts, Foundation Handbook and Design Guide.
Learned also from OS to use this tool: Data Access Slice Security.
- OS Solution Exchange
Thank you all.
Related Content
- 3 years ago
- 7 months ago
- 2 years ago