Forum Discussion
- OSAdminValued ContributorOriginally posted by Chul Smith
Your options are valid. Another option would be to break down the execution and certification groups into further detail - complicates the security model but accomplishes what they're trying to do.
Related Content
- 2 years ago
- 8 months ago
- 12 months ago