Users Guide

Table Of Contents
Appendix A: ...............................................................................................................................135
Security Roles and Permissions................................................................................................................................... 135
Data Integrity.............................................................................................................................................................. 135
Access Control Authentication, Authorization, and Roles............................................................................... 135
Dell Operational Role.................................................................................................................................................136
Dell Infrastructure Deployment Role..................................................................................................................... 136
Understanding Privileges......................................................................................................................................... 136
Appendix B: ...............................................................................................................................138
Contents 9