How is user access implemented?
A. The application utilises its own user list and built-in multi-level security system. Functional access can be restricted against each role by disabling over one hundred separate functional elements. Data scope access is optionally restricted by criteria over which segments of the audit universe each user is entitled to see.