Managing administration security

This section describes how to configure access management when not using Central Governance.

This section provides an overview of the security system and is particularly aimed at IS managers, security administrators, and those responsible for operations-related issues. You should be familiar with the file transfer process before beginning the security topics.

A prior knowledge of the Transfer CFT environment is required.

Related Links