Solved
Forum Discussion
KH1
3 months agoContributor II
Slice Security by U1# has been deployed by following several earlier posts, Foundation Handbook and Design Guide.
Learned also from OS to use this tool: Data Access Slice Security.
- OS Solution Exchange
Thank you all.
Related Content
- 4 years ago
- 8 months ago
- 2 years ago