Forum Discussion
OSAdmin
5 years agoValued Contributor
Originally posted by Chul Smith
Your options are valid. Another option would be to break down the execution and certification groups into further detail - complicates the security model but accomplishes what they're trying to do.
Related Content
- 2 years ago
- 2 years ago
- 9 months ago