About configuring security policies

After you have determined your security strategy, you configure and/or create the appropriate security policies and roles and then specify to which users the people with those roles can assign project roles and access levels.



IBM Unica Marketing Operations
 
8.5.0
For more information, see our support and community site: Customer Central