Introduction
This book will explain about the permission levels and segregation that senhasegura offers to ensure that users have access only to the operations and data that are pertinent to them.
See also how a workflow of approvals is configured, allowed schedules for performing tasks, use of external authenticators, integration with ITMS systems and use through emergency access.
Understand how to track information usage and operations performed, through audit reports.