This article explains Aspire security setup that determines what access individual users have to your Aspire system.

It also provides a list of the individual permissions that determine access to specific system functionality along with detailed descriptions of those permissions.

Click Security Setup and Role Permissions to read the article.

Did this answer your question?