Managing permissions for identities

The whole point of using unique users and groups is to allow you to control access to encryption objects in the system to only those users whose roles require them to have access. The information in this section will help you understand how permissions work, and how to give users access to data in the system.

For more detailed information on how permissions work across Trust Protection Platform, see About Permissions and Inheritance.

Related Topics Link IconRelated Topics