Access

Configure access and role-based access for the Therefore™ system.

Important topics include:

Two-Factor Authentication (2FA)

External User Directories

Users and Groups

Security