Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Version History

Version 1 Current »

Intellicus defines data access and integration according to user roles. Functionalities available to a user depend on the system privileges and access rights granted to the user.

Under Security Configurations, you will find guides to secure your data in Intellicus, perform data masking, and to run Intellicus under SSL. Refer the required category to pull out the information on how to perform the respective settings to securely operate Intellicus.

  • No labels