Security in System Config Last updated Save as PDF Access to this module is managed using secured actions and roles. Users require the secured action Configuration - Access to access this module. If you require access, then contact your System Administrator. For information on how to add secured actions to a role, refer to Manage User Roles.
Users require the secured action Configuration - Access to access this module. If you require access, then contact your System Administrator. For information on how to add secured actions to a role, refer to Manage User Roles.