Frequently Asked Questions
How does the security work? Can I restrict access to the different modules in IICM?
IICM's security scheme is implemented with a combination of User Groups, Matter Access Groups, and Field Access Groups. The User Groups control permissions to the modules and administrative utilities, the Group Access govern what modules a user is allowed to access as well as the type of access (i.e., no access, view-only, read/write), as well as field access to individual fields. You control what each user can do and see within IICM.
Last updated 12/24/2017 6:29 pm
Please Wait!
Please wait... it will take a second!