Solved
Forum Discussion
KH1
4 months agoContributor II
Slice Security by U1# has been deployed by following several earlier posts, Foundation Handbook and Design Guide.
Learned also from OS to use this tool: Data Access Slice Security.
- OS Solution Exchange
Thank you all.
Related Content
- 4 years ago
- 9 months ago
- 2 years ago