Authentication: What Users can Access
Authorization determines what users can access. In CIC, users are managed using a combination of the following:
- Roles: Administrators can view and select one or more OAS roles for users.
- Data Sources: Administrators can give access to specific data sources to users and/or user groups
- CIC Workspaces: Based on the user’s role and access to data sources, administrators can give users access to specific workspaces in the CIC user interface.
For more details, see the Primavera Administration Identity Management Administration Guide
Last Published Tuesday, November 19, 2024