• What are the uses of the Role configuration object?
  • How does one create a role using configuration subsystems?
  • How does one create a user list and specify user rights?
  • What is the difference between 1C:Enterprise authentication and operating system authentication?
  • How does one create database record- and field-level restrictions?
Go to the next lesson: Lesson 23 (1:10). Start page and command interface customization