Security object definition
You can use composer command line program to define security
objects in the database.
- Access control lists
- Each access control list assigns security roles to users or groups, in a certain security domain.
- Security domains
- Each domain represents the set of scheduling objects that users or groups can manage.
- Security roles
- Each role represents a certain level of authorization that defines the set of actions that users or groups can perform on a set of object types.