Administer > System security > Security tables

Security tables

ITSMA Service Management applications contain built-in security that enables an administrator to define the rights for individual users (operators). For example, some users may have the right to open a call report or incident, but not to close a call report or incident.