User Roles and Groups
Details about user roles and groups for a common setup.
Protegrity deployments include the following components:
It requires a structured permission model to ensure that only authorized users can access protected resources. The permissions define the ability to execute, read, or modify protected resources. This section provides recommended user and group configurations, file and folder permissions, and step‑by‑step deployment guidance for a common use case.
Details about user roles and groups for a common setup.
Details about ownership of all Protegrity components.
List of permissions required for users and groups, core components, and files.
Was this page helpful?